General
-
Target
REF_MIDLGB34.xlsx
-
Size
327KB
-
Sample
211014-j87swagegj
-
MD5
18427b9e1b0494341170d883e691888d
-
SHA1
bb19d8da9b524b1749ad517fe4ddde5aa0d9745d
-
SHA256
20d0bd1ac88343ffc84035773ddb7ea0dcf14525fa9da7d3d8fd11239ab100fa
-
SHA512
8ad87486ef0a10a5cc8feceb9c6abdc3950c715e7241f79c209ab33f2dacb6699b23c72ee777d567049e85cd6589793183a7dedf8e4126ddaa059ed764076aa6
Static task
static1
Behavioral task
behavioral1
Sample
REF_MIDLGB34.xlsx
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
REF_MIDLGB34.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
xloader
2.5
rqan
http://www.cardboutiqueapp.com/rqan/
panda.wiki
gailkannamassage.com
ungravitystudio.com
coraggiomusicschool.com
51walkerstreetrippleside.com
infemax.store
mapara-foundation.net
elitespeedwaxs.com
manateeprint.com
thelocksmithtradeshow.com
phoenix-out-of-ashes.com
marionkgregory.store
abasketofwords.com
century21nokta.com
anthonyaarnold.com
forevermyanmar.com
ramashi.com
uniquecarbonbrush.com
packecco.com
appelnacrtl.quest
mayo-group.com
healthychefla.com
chuhaitalk.com
promoapp12.com
sergomosta.com
missuniversepr.com
onfinan.com
moyue27.com
miaocharge.com
hubmedia.digital
sarasota-pressurewashing.com
deliciousrecipe.xyz
rosalia-pilates-angers.com
qqsmt09.com
comercialjyv.com
ismarthings.com
b8ceex.com
reviewbyornex.online
familylovmix.com
wurzelwerk-sk.com
buratacoin.com
delocdinh.com
paraspikakasino.com
buyinsurance24.com
d1storesa.com
apollonfitnessvrn.club
tokofebri.store
cambabez.xyz
pointcon.net
digitalcoursepreneur.com
15dgj.xyz
mg-garage.com
claggs.com
yuezhong66.com
uvowtae.xyz
puutuisossa.quest
glitchpunks.art
haferssippe.quest
ucwykl.biz
finlandtwo.xyz
efterpisart.com
usbankofamerican.com
bamubusinesssolutions.com
lakshhomesbalram.info
Targets
-
-
Target
REF_MIDLGB34.xlsx
-
Size
327KB
-
MD5
18427b9e1b0494341170d883e691888d
-
SHA1
bb19d8da9b524b1749ad517fe4ddde5aa0d9745d
-
SHA256
20d0bd1ac88343ffc84035773ddb7ea0dcf14525fa9da7d3d8fd11239ab100fa
-
SHA512
8ad87486ef0a10a5cc8feceb9c6abdc3950c715e7241f79c209ab33f2dacb6699b23c72ee777d567049e85cd6589793183a7dedf8e4126ddaa059ed764076aa6
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-