General
-
Target
PO-33120.doc
-
Size
963KB
-
Sample
211018-jaqfyadbg8
-
MD5
71302ed111a77e0a4ea1b7e88443771c
-
SHA1
035707574afb4e7176b16e23cfc56184c8cf670e
-
SHA256
b2c3f7a700072b93747169f7d0b90b39d44c1089f64ede59a8db55eab4fdfd69
-
SHA512
53032ed76c9a9d4198c09f6b98263b0231073898c3fe36416ac64c51c7d048b16bac949ffa43f1eb30f7b2755c54fbe52c8652b78f436eb2726638655bcdf361
Static task
static1
Behavioral task
behavioral1
Sample
PO-33120.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PO-33120.doc
Resource
win10-en-20211014
Malware Config
Extracted
xloader
2.5
noha
http://www.mglracing.com/noha/
iphone13promax.support
trailer-racks.xyz
overseaspoolservice.com
r2d2u.com
dawajeju.com
nextgenproxyvote.com
xn--vhqp8mm8dbtz.group
commonsenserisk.com
cmcqgxtyd.com
data2form.com
bois-applique.com
originallollipop.com
lj0008lj.net
spfldvaccineday.info
phalcosnusa.com
llcmastermachine.com
onlyforu14.rest
bestmarketingautomations.com
officialswitchmusic.com
thepretenseofjustice.com
authenticradio.net
standardizedsubmissions.com
aegnoshipping.com
478762.com
inclusionchecks.com
number-is-04.net
yyds9527.space
big-thought.com
controle2.email
groupninemed.com
fisworkdeck.com
imonbayazid.com
pixlrz.com
headlinebysmp.com
simulatefuck.com
efficientmother.com
wkshops22012.xyz
artehamburguer.com
beauallenpoetry.com
bonairemarathon.com
sprintfingers.com
ranbix.com
denghaoxin.club
jillianvansice.com
purpledge.com
mariadimitropoulou.com
surveyplanetgroup.tech
apocalyptoapertureserrature.net
cbd-cannabis.store
dirtcheapfire.com
xn--zbss74a16j.xn--czru2d
auth-appsgo.com
estchemdelat.space
kweeka.money
marketingtipsntricks.com
dayandwestbeauty.com
paddlercentral.com
nongminle.net
aodesai.store
evtasimaucretleri.com
micj7873.com
unarecord.com
zsnhviig.xyz
hallmark-transport.com
Targets
-
-
Target
PO-33120.doc
-
Size
963KB
-
MD5
71302ed111a77e0a4ea1b7e88443771c
-
SHA1
035707574afb4e7176b16e23cfc56184c8cf670e
-
SHA256
b2c3f7a700072b93747169f7d0b90b39d44c1089f64ede59a8db55eab4fdfd69
-
SHA512
53032ed76c9a9d4198c09f6b98263b0231073898c3fe36416ac64c51c7d048b16bac949ffa43f1eb30f7b2755c54fbe52c8652b78f436eb2726638655bcdf361
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-