General
-
Target
491a2083c1bfd87c4b26dd687316b7fc50e2a35771e57e45769043d21bc8bca5
-
Size
892KB
-
Sample
241121-zg6z9ssjbj
-
MD5
20d507beaa8f361c5af382efbf87cf33
-
SHA1
5e5dbc5bb8f02d096b5b9ade61c1142d2097dab5
-
SHA256
491a2083c1bfd87c4b26dd687316b7fc50e2a35771e57e45769043d21bc8bca5
-
SHA512
0ffa180e5ebd3ad15d0069abc8e409a90ca295164bdeae9379e5e740f31893c7914355617d3f3cb8bab29602b6712de230ab80028770bb0faf10f4f210fa28be
-
SSDEEP
24576:m+ODiZ6H/v1UAQkyplydQ6ins8adpyWtQ7B7Ti:56nFQkjRq9C
Static task
static1
Behavioral task
behavioral1
Sample
nuevo orden.xlsx.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
f3bq
EycW4KsHurZ80uRoO5Ci7qqvYA==
qTeo+vvLiXtITF++qA==
aN69k0COUW1Xt8xTIGl1GX59NYoXPHZh
WHDM3u/Jyu6xx5lEtISl7qqvYA==
TOlj27idD7p4MYTE/Dg=
AC71rZJwmD0TY/VK
iysL+SA+7FMTY/VK
N9e+ns2plwr+0C83ztRc
6OQtlIdjkAvFqzE3ztRc
39k8+W7n0llTNYTE/Dg=
lq0Y/ktyn0MDx01CfsfvG7U9PPw=
3nxaPQRrFwnWKDC65zBq+Q==
R9OzJ70qqVH/f7b0URQN4fTL
9zWtmE24YYxslCdqsboN4fTL
oTchmfxOEi4wtQ0S7PvY0Xo=
HrCsl9K1sdiImmzWGO4ijiPpdw==
rFQw9LEwYAcIBNU3ztRc
Z50ArBOKdqETY/VK
T0mvicHsMFkHw0o=
Yw/oyfoe2flkp5Me82IED5nEG9gYYQ==
8XLKca6Ehu3V1rkr/lNvN7U9PPw=
Mk9dP2pRQ7mNF36Aslqd7qqvYA==
8BB/WJl7wmlZTyWR2Jmi7qqvYA==
6/pAihhrbFE8ew==
BSkbcetUDDAkc1ImifvY0Xo=
bY+G1VXex/2+/Atfoc5L
WPXx6Qb2LaFnNYTE/Dg=
Mcu2YWZYhT5HTkbE/8btXv/deQ==
fxMF30Tk2FBg
WNmwib2uphscQiSOh7ztG7U9PPw=
SmOrAf/g4JZkdvxI
OVHBpl0UqH0TY/VK
Y5v4Pc42F4uUoSh0xsYN4fTL
AwFqLaAS0OroYoTE/Dg=
ga0H23HRUkErlOsPfPvY0Xo=
AiKPVYdvv1MTY/VK
qCbxYtE2MBIXcg==
/huNQ7YVh3V857po5zBq+Q==
rlmkmE3EgamrL2ic4uFq9Cv21ugI
Bqujd5OwbYNHTF++qA==
6ht3QItma4JITF++qA==
ljUfiftYFi8oqAYP7PvY0Xo=
Y/nXkNCgbFE8ew==
xH1nVyOJRjn2B9xiRbhAJ6kP1ar0ZA==
BAh+TLkb3RIIVmDmwBgN4fTL
n8AyGE8obxgdGfWU6/RNDP7S
SsQlgXl5sBbYdhpCcD0=
z9/Hh069r+N7dlTE5zBq+Q==
GryUQbcj0cCD07ooWHaiR8gvWdkeYJA=
uXqO5LTWlCY6bA==
b+lFqaKW+5lA1PO17ExgHb4Q1ar0ZA==
h4derhuKPmJjt45OxApBXET21ugI
8PtzZQuJeZ5QZlDUC8T4ovQKrLcXPHZh
lMCvVxq7L1Q9eQ==
5umVWZmJAOhc6UU=
R15PEzYXTDIMZg==
mB5wLnQtl04OyE8=
X4/+stfIOyb+TDVfoc5L
G56Lc4jIwdtu
hh2QNufYlCY6bA==
kq8d5jw0Y9CAPJyAVyRMT9goVtkeYJA=
H5+ZxIPXGqN1
nDgQkyCQPmdYt69s5zBq+Q==
UEtDpg92bFE8ew==
geraldohassimoveis.com
Extracted
xloader
2.9
f3bq
EycW4KsHurZ80uRoO5Ci7qqvYA==
qTeo+vvLiXtITF++qA==
aN69k0COUW1Xt8xTIGl1GX59NYoXPHZh
WHDM3u/Jyu6xx5lEtISl7qqvYA==
TOlj27idD7p4MYTE/Dg=
AC71rZJwmD0TY/VK
iysL+SA+7FMTY/VK
N9e+ns2plwr+0C83ztRc
6OQtlIdjkAvFqzE3ztRc
39k8+W7n0llTNYTE/Dg=
lq0Y/ktyn0MDx01CfsfvG7U9PPw=
3nxaPQRrFwnWKDC65zBq+Q==
R9OzJ70qqVH/f7b0URQN4fTL
9zWtmE24YYxslCdqsboN4fTL
oTchmfxOEi4wtQ0S7PvY0Xo=
HrCsl9K1sdiImmzWGO4ijiPpdw==
rFQw9LEwYAcIBNU3ztRc
Z50ArBOKdqETY/VK
T0mvicHsMFkHw0o=
Yw/oyfoe2flkp5Me82IED5nEG9gYYQ==
8XLKca6Ehu3V1rkr/lNvN7U9PPw=
Mk9dP2pRQ7mNF36Aslqd7qqvYA==
8BB/WJl7wmlZTyWR2Jmi7qqvYA==
6/pAihhrbFE8ew==
BSkbcetUDDAkc1ImifvY0Xo=
bY+G1VXex/2+/Atfoc5L
WPXx6Qb2LaFnNYTE/Dg=
Mcu2YWZYhT5HTkbE/8btXv/deQ==
fxMF30Tk2FBg
WNmwib2uphscQiSOh7ztG7U9PPw=
SmOrAf/g4JZkdvxI
OVHBpl0UqH0TY/VK
Y5v4Pc42F4uUoSh0xsYN4fTL
AwFqLaAS0OroYoTE/Dg=
ga0H23HRUkErlOsPfPvY0Xo=
AiKPVYdvv1MTY/VK
qCbxYtE2MBIXcg==
/huNQ7YVh3V857po5zBq+Q==
rlmkmE3EgamrL2ic4uFq9Cv21ugI
Bqujd5OwbYNHTF++qA==
6ht3QItma4JITF++qA==
ljUfiftYFi8oqAYP7PvY0Xo=
Y/nXkNCgbFE8ew==
xH1nVyOJRjn2B9xiRbhAJ6kP1ar0ZA==
BAh+TLkb3RIIVmDmwBgN4fTL
n8AyGE8obxgdGfWU6/RNDP7S
SsQlgXl5sBbYdhpCcD0=
z9/Hh069r+N7dlTE5zBq+Q==
GryUQbcj0cCD07ooWHaiR8gvWdkeYJA=
uXqO5LTWlCY6bA==
b+lFqaKW+5lA1PO17ExgHb4Q1ar0ZA==
h4derhuKPmJjt45OxApBXET21ugI
8PtzZQuJeZ5QZlDUC8T4ovQKrLcXPHZh
lMCvVxq7L1Q9eQ==
5umVWZmJAOhc6UU=
R15PEzYXTDIMZg==
mB5wLnQtl04OyE8=
X4/+stfIOyb+TDVfoc5L
G56Lc4jIwdtu
hh2QNufYlCY6bA==
kq8d5jw0Y9CAPJyAVyRMT9goVtkeYJA=
H5+ZxIPXGqN1
nDgQkyCQPmdYt69s5zBq+Q==
UEtDpg92bFE8ew==
geraldohassimoveis.com
Targets
-
-
Target
nuevo orden.xlsx.exe
-
Size
741KB
-
MD5
b414629b844d0a8cf08cd22d175a82f6
-
SHA1
0d9f83e40a924ba16e9bde6f3d2b5dbc19056703
-
SHA256
6124faef534c43b40607b85ffc1798cb3064d7eb2239422d2b35826a6de5e3ee
-
SHA512
d4e6f4f21b5426dcbac8d53feb96155202d9f09ac51299c3b3d02b7d5163f6043e175e9f36ea08503de98aad21ff5ff1dcc0a68e8ab4cfad4a279795720f6c53
-
SSDEEP
12288:qG2AZMzJWsuhczRVQEIcA3Q9UJwUIscc1FOg9Y9jg0Fl6p+liq+c:qG21JnuizRV7lUJgog
-
Formbook family
-
Xloader family
-
Xloader payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-