General
-
Target
FTK-10294.xlsx
-
Size
797KB
-
Sample
211217-smw9paeeep
-
MD5
156881894f6358ff645dcbf9a7e1b288
-
SHA1
a17826844753f6db82cb4a033d6c762a835824be
-
SHA256
c020f3ef2b418c8916521d40d372dc1d00b4fd03349d579827e429db3456875f
-
SHA512
4629eecf33ccf23301abcbc5537fa034927e4d40949ac1a2e5f1d5a98233fbc0af52e8acd9836421484bfff3e029f77a0a2b42aca22c09f7399604b279301d32
Static task
static1
Behavioral task
behavioral1
Sample
FTK-10294.xlsx
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
FTK-10294.xlsx
Resource
win10-en-20211208
Malware Config
Extracted
xloader
2.5
fqiq
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
esyscoloradosprings.com
Targets
-
-
Target
FTK-10294.xlsx
-
Size
797KB
-
MD5
156881894f6358ff645dcbf9a7e1b288
-
SHA1
a17826844753f6db82cb4a033d6c762a835824be
-
SHA256
c020f3ef2b418c8916521d40d372dc1d00b4fd03349d579827e429db3456875f
-
SHA512
4629eecf33ccf23301abcbc5537fa034927e4d40949ac1a2e5f1d5a98233fbc0af52e8acd9836421484bfff3e029f77a0a2b42aca22c09f7399604b279301d32
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-