General
-
Target
document.docdgklfwia
-
Size
21KB
-
Sample
220425-1vg4qsecd9
-
MD5
7eaf1191dd524f013b3da5637cc65020
-
SHA1
83f34f15b36102026280e53cb2b44cbb24f03104
-
SHA256
177d47fb1686f807548d86cccc3c1783125a02b197e827981e842a7fe273fd13
-
SHA512
670f3fe1878a7e478321e3c7baf2c8833891b03bfd56afbfa7bcc9cf4b81be3ecda12c51a3866c75ae18bc7074f5408a334eaf4db67d5d466a48ae390889f702
Static task
static1
Behavioral task
behavioral1
Sample
document.rtf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
document.rtf
Resource
win10v2004-20220414-en
Malware Config
Extracted
xloader
2.5
a2c8
sethdukes.online
hustl-hk.com
alienspacebabes.com
yitongbag.com
adlichoob.com
wejust5.com
wwwsnapfinancial.com
patriotcapitalgroupllc.com
divaconnectionbuild.com
adventureventures.net
jaromer.net
closureservices.com
sdc-english.com
fleet-lab.com
gtgits.com
clinicaorion.com
deleaderainfluenceur.com
honghuamach.net
638661.com
sleepgenies.info
strtplay2day.info
ellsworthfunds.com
workthered.com
handsomered.com
6953.online
discover4two.com
yshengxiang.com
thenicnackgyrls.com
deathtohope.com
lhdtrj.com
primedispatchers.com
rojosusa.com
ekini.online
hdlypx.com
trendsplayers.xyz
inclusichecks.com
idm-convention.com
efp-advisors.com
kansaslivestockfoundation.com
2020taxpros.com
chesexamprep.com
fking.biz
vmhenterprise.com
cherrythechickenandfriends.com
unheek.com
somnoengineering.com
aaraeg.net
jbzisha.com
healthoffword.xyz
redis76.com
gigtex.com
schoolaccred.net
vadiemfg.com
tbrme.plus
icdmeister.com
sunshinecoastfashion.com
babypasal.com
kaizenswinger.com
apfllcadvisors.com
cheffumeur.com
luzider-traum.net
functionalsoft.com
toityzvolat.quest
awla-bus.com
westexeurope.com
Targets
-
-
Target
document.docdgklfwia
-
Size
21KB
-
MD5
7eaf1191dd524f013b3da5637cc65020
-
SHA1
83f34f15b36102026280e53cb2b44cbb24f03104
-
SHA256
177d47fb1686f807548d86cccc3c1783125a02b197e827981e842a7fe273fd13
-
SHA512
670f3fe1878a7e478321e3c7baf2c8833891b03bfd56afbfa7bcc9cf4b81be3ecda12c51a3866c75ae18bc7074f5408a334eaf4db67d5d466a48ae390889f702
Score10/10-
Xloader Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-