General
-
Target
IMS211323.xlsx
-
Size
446KB
-
Sample
211026-kw6kqahhdr
-
MD5
295b9af11cde64a883299d1790239034
-
SHA1
5c51f35a68ed2c0333d25aec2d456660d4b3cf65
-
SHA256
f478d6aa621a6a35cb6c38307541f0ffbb151683a5f89dcaf497d5678bbb50e6
-
SHA512
b8017f40fb9a79c99e81cd25bf98a11c14b731788b5ac8771a07724fa95cc3a4f515c432105e8c759b83349e6c6fbad4b20a675543a00aa2c021e78c56493e23
Static task
static1
Behavioral task
behavioral1
Sample
IMS211323.xlsx
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
IMS211323.xlsx
Resource
win10-en-20211014
Malware Config
Extracted
xloader
2.5
euzn
http://www.heser.net/euzn/
235296tyc.com
gold12guide.art
baibuaherb.com
weberwines.tax
chezvitoria.com
aidenb.tech
pitchdeckservice.com
surgeryforfdf.xyz
workunvaccinated.com
hrtaro.com
yourotcs.com
sonimultispecialityclinic.com
consultantadvisors.com
pentesting-consulting.com
dantechs.digital
longshifa.online
taweilai.net
imyusuke.com
cashndashfinancial.com
fasiglimt.quest
jakital.com
graywolfdesign.com
pepeavatar.com
predixlogisticscourier.com
football-transfer-news.pro
herbalmedication.xyz
esd66.com
janesgalant.quest
abcrefreshments.com
chaoxy.com
rediscoveringyouhealing.com
mcrjadr5.xyz
n4sins.com
faithful-presence.com
013yu.xyz
isystemslanka.com
newbeautydk.com
ethiopia-info.com
hgaffiliates.net
anodynemedicalmassage.com
esohgroup.com
clinicamonicabarros.com
rafathecook.com
londonescort.xyz
dreamites.com
webtiyan.com
cnnautorepair.com
soposhshop.com
aarohaninsight2021.com
arceprojects.com
mecasso.store
mirai-energy.com
barwg.com
angeescollections-shop.com
xinlishiqiaoqiao.xyz
linuxsauce.net
dirbn.com
anandiaper.xyz
blackpanther.online
livinwoodbridgefarms.com
diepraxiskommunikation.com
radiosaptshahid.com
gofieldtest.com
minxtales.com
Targets
-
-
Target
IMS211323.xlsx
-
Size
446KB
-
MD5
295b9af11cde64a883299d1790239034
-
SHA1
5c51f35a68ed2c0333d25aec2d456660d4b3cf65
-
SHA256
f478d6aa621a6a35cb6c38307541f0ffbb151683a5f89dcaf497d5678bbb50e6
-
SHA512
b8017f40fb9a79c99e81cd25bf98a11c14b731788b5ac8771a07724fa95cc3a4f515c432105e8c759b83349e6c6fbad4b20a675543a00aa2c021e78c56493e23
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-