General
-
Target
DMS210949 MV LYDERHORN LOW MIX RATIO.xlsx
-
Size
369KB
-
Sample
211020-g95nssgff2
-
MD5
f0431537ea328d693794cc1f76e71d4e
-
SHA1
9f85f8521124a839bd91c1b30ee3fb069b1e3f9a
-
SHA256
cbf141a6250e4b1ea84857caf3e715e0341ec4bac8c4f4c72733300a8b67d425
-
SHA512
62bd083c9553775a624122b89fa1717a92820d49e05f880208baba212c5cb700abaf3dd0645457ef285419087aa601f86efe83b2b3654fb61dfa8923fc90d935
Static task
static1
Behavioral task
behavioral1
Sample
DMS210949 MV LYDERHORN LOW MIX RATIO.xlsx
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
DMS210949 MV LYDERHORN LOW MIX RATIO.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
xloader
2.5
fqiq
http://www.esyscoloradosprings.com/fqiq/
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
Targets
-
-
Target
DMS210949 MV LYDERHORN LOW MIX RATIO.xlsx
-
Size
369KB
-
MD5
f0431537ea328d693794cc1f76e71d4e
-
SHA1
9f85f8521124a839bd91c1b30ee3fb069b1e3f9a
-
SHA256
cbf141a6250e4b1ea84857caf3e715e0341ec4bac8c4f4c72733300a8b67d425
-
SHA512
62bd083c9553775a624122b89fa1717a92820d49e05f880208baba212c5cb700abaf3dd0645457ef285419087aa601f86efe83b2b3654fb61dfa8923fc90d935
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-