General
-
Target
IMS211323.xlsx
-
Size
440KB
-
Sample
211028-mn68dscbd2
-
MD5
701ebd3214408e1be59b168c7146ec68
-
SHA1
86982833e9a8652efe8ca90c54ae87ab28b746f4
-
SHA256
02f9d38714b8abb404c03b5250f815e60f5738ec15304d1265dbd57eb5668dc5
-
SHA512
cef1d3cd181c663152f54616df125af3ba9e8e8113ecf97e3771e16be5e331e946876a36b83adc44ac7e0cf3783f5d31b93552b754c5c785e23a22528dd26de5
Static task
static1
Behavioral task
behavioral1
Sample
IMS211323.xlsx
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
IMS211323.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
xloader
2.5
euzn
http://www.heser.net/euzn/
235296tyc.com
gold12guide.art
baibuaherb.com
weberwines.tax
chezvitoria.com
aidenb.tech
pitchdeckservice.com
surgeryforfdf.xyz
workunvaccinated.com
hrtaro.com
yourotcs.com
sonimultispecialityclinic.com
consultantadvisors.com
pentesting-consulting.com
dantechs.digital
longshifa.online
taweilai.net
imyusuke.com
cashndashfinancial.com
fasiglimt.quest
jakital.com
graywolfdesign.com
pepeavatar.com
predixlogisticscourier.com
football-transfer-news.pro
herbalmedication.xyz
esd66.com
janesgalant.quest
abcrefreshments.com
chaoxy.com
rediscoveringyouhealing.com
mcrjadr5.xyz
n4sins.com
faithful-presence.com
013yu.xyz
isystemslanka.com
newbeautydk.com
ethiopia-info.com
hgaffiliates.net
anodynemedicalmassage.com
esohgroup.com
clinicamonicabarros.com
rafathecook.com
londonescort.xyz
dreamites.com
webtiyan.com
cnnautorepair.com
soposhshop.com
aarohaninsight2021.com
arceprojects.com
mecasso.store
mirai-energy.com
barwg.com
angeescollections-shop.com
xinlishiqiaoqiao.xyz
linuxsauce.net
dirbn.com
anandiaper.xyz
blackpanther.online
livinwoodbridgefarms.com
diepraxiskommunikation.com
radiosaptshahid.com
gofieldtest.com
minxtales.com
Targets
-
-
Target
IMS211323.xlsx
-
Size
440KB
-
MD5
701ebd3214408e1be59b168c7146ec68
-
SHA1
86982833e9a8652efe8ca90c54ae87ab28b746f4
-
SHA256
02f9d38714b8abb404c03b5250f815e60f5738ec15304d1265dbd57eb5668dc5
-
SHA512
cef1d3cd181c663152f54616df125af3ba9e8e8113ecf97e3771e16be5e331e946876a36b83adc44ac7e0cf3783f5d31b93552b754c5c785e23a22528dd26de5
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-