General
-
Target
2710-22BH.xlsx
-
Size
188KB
-
Sample
220404-pyhc5aaddn
-
MD5
e700a429e48c230e50b1c7f444352464
-
SHA1
e39110541a277e48899a2918d0ae2d08606a08b4
-
SHA256
4c402f8b029ece3a959db4fbacd3a13e94ecc89bb55d9c28d376b680cdf50862
-
SHA512
08e33d80d98bd204f355db212f50319f4b2665976d6292284b5e534e6e65d175a34ead56f7da56fccf88734e18d33eb37d1e42b19d5d3004e12fde5cb56664d5
Static task
static1
Behavioral task
behavioral1
Sample
2710-22BH.xlsx
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
2710-22BH.xlsx
Resource
win10v2004-20220331-en
Malware Config
Extracted
xloader
2.5
ahc8
192451.com
wwwripostes.net
sirikhalsalaw.com
bitterbaybay.com
stella-scrubs.com
almanecermezcal.com
goodgood.online
translate-now.online
sincerefilm.com
quadrantforensics.com
johnfrenchart.com
plick-click.com
alnileen.com
tghi.xyz
172711.com
maymakita.com
punnyaseva.com
ukash-online.com
sho-yururi-blog.com
hebergement-solidaire.com
civicinfluencers.net
gzhf8888.com
kuleallstar.com
palisadeslodgecondos.com
holyhirschsprungs.com
azalearoseuk.com
jaggllc.com
italianrofrow.xyz
ioewur.xyz
3a5hlv.icu
kitcycle.com
estate.xyz
ankaraescortvip.xyz
richclubsite2001.xyz
kastore.website
515pleasantvalleyway.com
sittlermd.com
mytemple.group
tiny-wagen.com
sharaleesvintageflames.com
mentalesteem.com
sport-newss.online
fbve.space
lovingtruebloodindallas.com
eaglehospitality.biz
roofrepairnow.info
mcrosfts-updata.digital
cimpactinc.com
greatnotleyeast.com
lovely-tics.com
douglas-enterprise.com
dayannalima.online
ksodl.com
rainbowlampro.com
theinteriorsfurniture.com
eidmueller.email
cg020.online
gta6fuzhu.com
cinemaocity.com
hopeitivity.com
savageequipment.biz
groceriesbazaar.com
hempgotas.com
casino-pharaon-play.xyz
ralfrassendnk-login.com
Targets
-
-
Target
2710-22BH.xlsx
-
Size
188KB
-
MD5
e700a429e48c230e50b1c7f444352464
-
SHA1
e39110541a277e48899a2918d0ae2d08606a08b4
-
SHA256
4c402f8b029ece3a959db4fbacd3a13e94ecc89bb55d9c28d376b680cdf50862
-
SHA512
08e33d80d98bd204f355db212f50319f4b2665976d6292284b5e534e6e65d175a34ead56f7da56fccf88734e18d33eb37d1e42b19d5d3004e12fde5cb56664d5
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-