General
-
Target
New_Order.xlsx
-
Size
169KB
-
Sample
211102-klbbtscbg5
-
MD5
924b9433629fa62bb788d53bd408bf34
-
SHA1
9c3232c6e59aefdf2426d55b1752664166bb01eb
-
SHA256
b0c314459603fd3d02158655704e3415482e7d816c62f7373f5136f32f17ec5c
-
SHA512
2f485c147ec00c54dd2d08542a743b736e78fedfd5eabf5e9b7a9bd7d937dfedb8fefc974bcbdbca6aad22eb761449bedc11b6cda66c0a8b12232c05ca856392
Static task
static1
Behavioral task
behavioral1
Sample
New_Order.xlsx
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
New_Order.xlsx
Resource
win10-en-20210920
Malware Config
Extracted
xloader
2.5
rqan
http://www.cardboutiqueapp.com/rqan/
panda.wiki
gailkannamassage.com
ungravitystudio.com
coraggiomusicschool.com
51walkerstreetrippleside.com
infemax.store
mapara-foundation.net
elitespeedwaxs.com
manateeprint.com
thelocksmithtradeshow.com
phoenix-out-of-ashes.com
marionkgregory.store
abasketofwords.com
century21nokta.com
anthonyaarnold.com
forevermyanmar.com
ramashi.com
uniquecarbonbrush.com
packecco.com
appelnacrtl.quest
mayo-group.com
healthychefla.com
chuhaitalk.com
promoapp12.com
sergomosta.com
missuniversepr.com
onfinan.com
moyue27.com
miaocharge.com
hubmedia.digital
sarasota-pressurewashing.com
deliciousrecipe.xyz
rosalia-pilates-angers.com
qqsmt09.com
comercialjyv.com
ismarthings.com
b8ceex.com
reviewbyornex.online
familylovmix.com
wurzelwerk-sk.com
buratacoin.com
delocdinh.com
paraspikakasino.com
buyinsurance24.com
d1storesa.com
apollonfitnessvrn.club
tokofebri.store
cambabez.xyz
pointcon.net
digitalcoursepreneur.com
15dgj.xyz
mg-garage.com
claggs.com
yuezhong66.com
uvowtae.xyz
puutuisossa.quest
glitchpunks.art
haferssippe.quest
ucwykl.biz
finlandtwo.xyz
efterpisart.com
usbankofamerican.com
bamubusinesssolutions.com
lakshhomesbalram.info
Targets
-
-
Target
New_Order.xlsx
-
Size
169KB
-
MD5
924b9433629fa62bb788d53bd408bf34
-
SHA1
9c3232c6e59aefdf2426d55b1752664166bb01eb
-
SHA256
b0c314459603fd3d02158655704e3415482e7d816c62f7373f5136f32f17ec5c
-
SHA512
2f485c147ec00c54dd2d08542a743b736e78fedfd5eabf5e9b7a9bd7d937dfedb8fefc974bcbdbca6aad22eb761449bedc11b6cda66c0a8b12232c05ca856392
Score10/10-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-