General
-
Target
MV LILY SEA_xlsx.exe
-
Size
294KB
-
Sample
220222-lcf2dsgcdk
-
MD5
6ec38c4638933adf4e6431c599572869
-
SHA1
7daceef37fd49f19393b9cc0c03b5bd0625b6eb4
-
SHA256
4693178ae42f25930859574bbaa0b9eb93a011b9233c43639c53689ecd47a15c
-
SHA512
08836096c927d30c9dc4207bbdb0468234f4c2e44eeb873ba755d8976ea578d041c708d97a97cff85cbf8ac27841cba9c1683b54b67e2da029ade8cb8e5d3257
Static task
static1
Behavioral task
behavioral1
Sample
MV LILY SEA_xlsx.exe
Resource
win7-en-20211208
Malware Config
Extracted
xloader
2.5
dtt3
edilononlineshop.com
cursosd.com
viellacharteredland.com
increasey0urenergylevels.codes
yjy-hotel.com
claym.xyz
reelsguide.com
gives-cardano.com
ashrafannuar.com
mammalians.com
rocketleaguedads.com
yubierp.com
minimi36.com
chn-chn.com
jagojp888.com
parsian-shetab.com
273351.com
mdtouhid.com
babedads.com
vallinam2.com
buro-tic.com
az-rent.net
shifaebio.xyz
circuitoalberghiero.com
xn--b1afb9b.xn--p1acf
canlioyundasin.online
sachainchirajaomega.com
scandinest.com
pluky.net
tpxcy.com
nbg.global
automountproducts.com
hghbj.com
beachsidecoatings.com
householdertips.com
coworkingspace.online
doujyou.com
tenloe053.xyz
udpbkp.biz
kondanginyuk.online
zipiter.com
christiankrog.com
reliantrecruitinggroup.com
acrylicus.com
cruelgirls.biz
oeinsulation.com
mapnft.xyz
leadersfort.com
foodroutine.com
mayerohio.info
systemofsolutions.com
gideonajibike.com
bigboobz.net
townofis.com
mhkxlgs.com
sussaautocare.com
quicktle.com
boutiquedangel.com
garrisonroadhouse.com
stiff-pols.art
cabalaconsultores.com
theweddinggame.net
themoneymagicians.com
overtonesa.com
janasflannels.com
Targets
-
-
Target
MV LILY SEA_xlsx.exe
-
Size
294KB
-
MD5
6ec38c4638933adf4e6431c599572869
-
SHA1
7daceef37fd49f19393b9cc0c03b5bd0625b6eb4
-
SHA256
4693178ae42f25930859574bbaa0b9eb93a011b9233c43639c53689ecd47a15c
-
SHA512
08836096c927d30c9dc4207bbdb0468234f4c2e44eeb873ba755d8976ea578d041c708d97a97cff85cbf8ac27841cba9c1683b54b67e2da029ade8cb8e5d3257
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-