General
-
Target
CAMILLE ORDER 27.10.2021.xlsx
-
Size
446KB
-
Sample
211028-lvhypsfhdj
-
MD5
93e73ece6b55b5445c0f89c9debb0aca
-
SHA1
b7566ab0ee295049b2801d3d8443f3f58bf08e83
-
SHA256
2e362cc53cfb4e04d0a044e896233a71ab8e521f0248fb7edbdb868f4228a070
-
SHA512
81dda7bace7d263009a41ea6c32ed0d7a465ecdf7870c60c20350f78cdd0e2586854d760df46f9bc0d1ade9187b0f336da8a75579bb09e72e5157a3122aeddd0
Static task
static1
Behavioral task
behavioral1
Sample
CAMILLE ORDER 27.10.2021.xlsx
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
CAMILLE ORDER 27.10.2021.xlsx
Resource
win10-en-20211014
Malware Config
Extracted
xloader
2.5
fqiq
http://www.esyscoloradosprings.com/fqiq/
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
Targets
-
-
Target
CAMILLE ORDER 27.10.2021.xlsx
-
Size
446KB
-
MD5
93e73ece6b55b5445c0f89c9debb0aca
-
SHA1
b7566ab0ee295049b2801d3d8443f3f58bf08e83
-
SHA256
2e362cc53cfb4e04d0a044e896233a71ab8e521f0248fb7edbdb868f4228a070
-
SHA512
81dda7bace7d263009a41ea6c32ed0d7a465ecdf7870c60c20350f78cdd0e2586854d760df46f9bc0d1ade9187b0f336da8a75579bb09e72e5157a3122aeddd0
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016
-
suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL
suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-