General
-
Target
Transfer Proposal-Sekou Conde.xlsx
-
Size
228KB
-
Sample
211207-nl61aaghgk
-
MD5
4b7a11562ca55592aa48d0a2d1086b84
-
SHA1
790a4f9d518afbe3dc40705e46edda80e3a3ad10
-
SHA256
7544680ca64c3fb1d48aa3f826235577520526b26ef707f17f33c89618213510
-
SHA512
1ea3e04c0d8f4cdbb4d21b75cd84dc60ed61ad0fa9949feed52e23340bb27945ea0bfe4e1e2bf5d69a437bd39d8e9d569c561c7a42999ab7039c4a82681c5676
Static task
static1
Behavioral task
behavioral1
Sample
Transfer Proposal-Sekou Conde.xlsx
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Transfer Proposal-Sekou Conde.xlsx
Resource
win10-en-20211104
Malware Config
Extracted
xloader
2.5
sb6n
http://www.best5amazon.com/sb6n/
bogosamba.com
inmobiliariapuertalavilla.com
nopressurewellness.com
hairshopamity.com
epicmoments360.com
tutorgpa.com
fucibou.xyz
135631.com
portraydashcam.com
raqsarabia.com
okantis.net
vongquaykimcuongfreefire.online
prodom.online
5537sbishop.info
lisakenneyinc.com
fivetime.xyz
borzv.com
joungla.com
mas-urbano.com
sjczyw.com
kanesia.com
cursovendasafiliagram.website
lumledstore.com
id-434563.site
tinkerform.com
chainedorchange.com
147149cale.com
windmillbusiness.com
moccocity.com
linkinsense.net
asportrans.com
texasmotorcycletransport.com
unviajeinsospechado.com
rishaande.tech
happylifecompanies.com
thewtot.com
homeyhousy.com
schoolx.space
gr-pcs.com
bedrocksolution.net
investorsbamk.com
rewoodlovro.quest
scratchforce.com
roosteco.com
zacharyparkerporward5.com
itranslate.club
mastessrhalco.com
jytyxyc.xyz
theelegantflamestore.com
grausalvarez.com
riveroakdevelopment.com
intervalagency.com
yugenft.com
6672pk.com
euphoricpucci.com
sedlmayer.gmbh
caricomrealestate.online
herseymagazamda.com
kefirusa.com
royalclnglegacy.com
toptanalcimalzemeleri.com
recbi56ni.com
transformdom.net
writersmight.com
Targets
-
-
Target
Transfer Proposal-Sekou Conde.xlsx
-
Size
228KB
-
MD5
4b7a11562ca55592aa48d0a2d1086b84
-
SHA1
790a4f9d518afbe3dc40705e46edda80e3a3ad10
-
SHA256
7544680ca64c3fb1d48aa3f826235577520526b26ef707f17f33c89618213510
-
SHA512
1ea3e04c0d8f4cdbb4d21b75cd84dc60ed61ad0fa9949feed52e23340bb27945ea0bfe4e1e2bf5d69a437bd39d8e9d569c561c7a42999ab7039c4a82681c5676
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-