General
-
Target
tmp/b24b9b917e98080f8647babd856118faf1bdb7834c085776d7486c15698011e1.xls
-
Size
228KB
-
Sample
211130-mfyw2shgg5
-
MD5
fcbab6886b4d111521b97fe48d642fe4
-
SHA1
cfcea1951c71b333bf2e962811ce0dbf8a6674bc
-
SHA256
b24b9b917e98080f8647babd856118faf1bdb7834c085776d7486c15698011e1
-
SHA512
c0db1c6186d1df11ea7db00dabd54dc573cb0195b1932a1b56028ebd854371785ab5d5d8bc93063dfc6faa11c2e7294e9b15dd005d7e40259be735a8a8506c24
Static task
static1
Behavioral task
behavioral1
Sample
tmp/b24b9b917e98080f8647babd856118faf1bdb7834c085776d7486c15698011e1.xls
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
tmp/b24b9b917e98080f8647babd856118faf1bdb7834c085776d7486c15698011e1.xls
Resource
win10-en-20211104
Malware Config
Extracted
xloader
2.5
sb6n
http://www.best5amazon.com/sb6n/
bogosamba.com
inmobiliariapuertalavilla.com
nopressurewellness.com
hairshopamity.com
epicmoments360.com
tutorgpa.com
fucibou.xyz
135631.com
portraydashcam.com
raqsarabia.com
okantis.net
vongquaykimcuongfreefire.online
prodom.online
5537sbishop.info
lisakenneyinc.com
fivetime.xyz
borzv.com
joungla.com
mas-urbano.com
sjczyw.com
kanesia.com
cursovendasafiliagram.website
lumledstore.com
id-434563.site
tinkerform.com
chainedorchange.com
147149cale.com
windmillbusiness.com
moccocity.com
linkinsense.net
asportrans.com
texasmotorcycletransport.com
unviajeinsospechado.com
rishaande.tech
happylifecompanies.com
thewtot.com
homeyhousy.com
schoolx.space
gr-pcs.com
bedrocksolution.net
investorsbamk.com
rewoodlovro.quest
scratchforce.com
roosteco.com
zacharyparkerporward5.com
itranslate.club
mastessrhalco.com
jytyxyc.xyz
theelegantflamestore.com
grausalvarez.com
riveroakdevelopment.com
intervalagency.com
yugenft.com
6672pk.com
euphoricpucci.com
sedlmayer.gmbh
caricomrealestate.online
herseymagazamda.com
kefirusa.com
royalclnglegacy.com
toptanalcimalzemeleri.com
recbi56ni.com
transformdom.net
writersmight.com
Targets
-
-
Target
tmp/b24b9b917e98080f8647babd856118faf1bdb7834c085776d7486c15698011e1.xls
-
Size
228KB
-
MD5
fcbab6886b4d111521b97fe48d642fe4
-
SHA1
cfcea1951c71b333bf2e962811ce0dbf8a6674bc
-
SHA256
b24b9b917e98080f8647babd856118faf1bdb7834c085776d7486c15698011e1
-
SHA512
c0db1c6186d1df11ea7db00dabd54dc573cb0195b1932a1b56028ebd854371785ab5d5d8bc93063dfc6faa11c2e7294e9b15dd005d7e40259be735a8a8506c24
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-