General
-
Target
MOQ-Request_0927210-006452.xlsx
-
Size
379KB
-
Sample
210927-lnwwzsgcej
-
MD5
154572bc1a3a7b1f732219dfce1d7985
-
SHA1
c79ee1ba99792a20a85dd1b55ce813567d33109a
-
SHA256
54bd4d38f3a15017ed0ceab138e8348d3ba97a6789920b50b5e93b5d0eec1ec9
-
SHA512
b28d127f51723e417ebab1e2d72830beaa3be45908749cf91e07d6c92ae673fc116a0138df5cb81c4ed3050ec64b7a1d34632d5436e368f43b6ed77cef41ceec
Static task
static1
Behavioral task
behavioral1
Sample
MOQ-Request_0927210-006452.xlsx
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
MOQ-Request_0927210-006452.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
xloader
2.5
m0np
http://www.devmedicalcentre.com/m0np/
gruppovimar.com
seniordatingtv.com
pinpinyouqian.website
retreatreflectreplenish.com
baby-handmade.store
econsupplies.com
helloaustinpodcast.com
europe-lodging.com
ferahanaokulu.com
thehomeinspo.com
rawhoneytnpasumo6.xyz
tyckasei.quest
scissorsandbuffer.com
jatinvestmentsmaldives.com
softandcute.store
afuturemakerspromotions.online
leonsigntech.com
havetheshortscovered.com
cvkf.email
iplyyu.com
motphimz.net
slimmerpage.com
fifthbelle.com
moneybagsinfinity.com
architettoaroma.com
rio-script.com
millieandmaude.net
pvinayak.com
nyctattoing.com
fermanfood.com
medardlake.com
40acgidd.com
mrbrianalba.com
110bao.com
shguitong.com
why5mkt.com
diptv.xyz
gotbn-a01.com
rene-weise.com
meltaluminum.com
tobiasqbrown.com
eiqor.com
bnabd.com
painubloc.com
bofoz.com
maxicashprogtq.xyz
probinns.com
yourroddays1.xyz
friedmantrusts.com
patrianilancamentos.com
cetpa.solutions
fengxiaowangluo.com
zkimax.com
bibberyhills.com
colegiodeltaaps.com
fraternitybrand.com
codemais.net
ohayouwww.com
keenflat.com
devvabaek.com
rouxbylarease.online
hongyuyinji.com
cybersecurity-andorra.online
zs4.info
Targets
-
-
Target
MOQ-Request_0927210-006452.xlsx
-
Size
379KB
-
MD5
154572bc1a3a7b1f732219dfce1d7985
-
SHA1
c79ee1ba99792a20a85dd1b55ce813567d33109a
-
SHA256
54bd4d38f3a15017ed0ceab138e8348d3ba97a6789920b50b5e93b5d0eec1ec9
-
SHA512
b28d127f51723e417ebab1e2d72830beaa3be45908749cf91e07d6c92ae673fc116a0138df5cb81c4ed3050ec64b7a1d34632d5436e368f43b6ed77cef41ceec
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-