General
-
Target
6c4a4577b05acbeb2d7daecf27658d03
-
Size
20KB
-
Sample
211029-xh22ladhg3
-
MD5
6c4a4577b05acbeb2d7daecf27658d03
-
SHA1
609fea5345fc11357c1d2dde6b33ac8db1d8b0f3
-
SHA256
3b581601796d4459571b4079419ea4e33065675c4dfb309877bace18fc8d1f63
-
SHA512
d749b744cb3d6d099bb46ccd03b5441950ec270f4b1c342c6b734192b36e73381e1a97f88184e9d29145234631ccef846b9cd8d2e72b35b0155af525511a47eb
Static task
static1
Behavioral task
behavioral1
Sample
6c4a4577b05acbeb2d7daecf27658d03.rtf
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
6c4a4577b05acbeb2d7daecf27658d03.rtf
Resource
win10-en-20211014
Malware Config
Extracted
xloader
2.5
euzn
http://www.heser.net/euzn/
235296tyc.com
gold12guide.art
baibuaherb.com
weberwines.tax
chezvitoria.com
aidenb.tech
pitchdeckservice.com
surgeryforfdf.xyz
workunvaccinated.com
hrtaro.com
yourotcs.com
sonimultispecialityclinic.com
consultantadvisors.com
pentesting-consulting.com
dantechs.digital
longshifa.online
taweilai.net
imyusuke.com
cashndashfinancial.com
fasiglimt.quest
jakital.com
graywolfdesign.com
pepeavatar.com
predixlogisticscourier.com
football-transfer-news.pro
herbalmedication.xyz
esd66.com
janesgalant.quest
abcrefreshments.com
chaoxy.com
rediscoveringyouhealing.com
mcrjadr5.xyz
n4sins.com
faithful-presence.com
013yu.xyz
isystemslanka.com
newbeautydk.com
ethiopia-info.com
hgaffiliates.net
anodynemedicalmassage.com
esohgroup.com
clinicamonicabarros.com
rafathecook.com
londonescort.xyz
dreamites.com
webtiyan.com
cnnautorepair.com
soposhshop.com
aarohaninsight2021.com
arceprojects.com
mecasso.store
mirai-energy.com
barwg.com
angeescollections-shop.com
xinlishiqiaoqiao.xyz
linuxsauce.net
dirbn.com
anandiaper.xyz
blackpanther.online
livinwoodbridgefarms.com
diepraxiskommunikation.com
radiosaptshahid.com
gofieldtest.com
minxtales.com
Targets
-
-
Target
6c4a4577b05acbeb2d7daecf27658d03
-
Size
20KB
-
MD5
6c4a4577b05acbeb2d7daecf27658d03
-
SHA1
609fea5345fc11357c1d2dde6b33ac8db1d8b0f3
-
SHA256
3b581601796d4459571b4079419ea4e33065675c4dfb309877bace18fc8d1f63
-
SHA512
d749b744cb3d6d099bb46ccd03b5441950ec270f4b1c342c6b734192b36e73381e1a97f88184e9d29145234631ccef846b9cd8d2e72b35b0155af525511a47eb
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-