General
-
Target
SWIFT Payment DOOEL EUR 74,246.41 20210101950848.exe
-
Size
895KB
-
Sample
210119-1872j4y4f6
-
MD5
b8ead540e40416915bd3f6134f2017bb
-
SHA1
e74cf3642e4bd4b3f616bc5230edd5312d97ecfc
-
SHA256
201f068c15e749ce1d3bd1a8e48909a9b0e8e5b0774b0eb2abc9096449fdbe67
-
SHA512
1e5631249b531d0abf6f3603016ec1e06d3efe55bae91c8db116ab5c94f126473448bf78338163a8cbc526bb168d70933014222150afbb9270a08303f0963002
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT Payment DOOEL EUR 74,246.41 20210101950848.exe
Resource
win7v20201028
Malware Config
Extracted
formbook
http://www.boundlesshealthyliving.com/isub/
beeyoubc.net
nimbleangel.com
woninghuurcuracao.com
hair2dye4.academy
affordablebothell.com
maglex.info
jacykretas.com
toushiys.com
gfitzfreetestcloud.com
sisuluzinterior.com
sunshipinvestments.com
lulenahairco.com
shangchen33.com
ocase24.com
shamanicsound.com
newbharatbakery.com
imratingit.net
twinningtreats.com
btzmed.com
bedtimewish.com
brooklynbdding.com
superrmpay.com
subterrashop.com
sproutwitch.com
jamrspecialties.com
emediamart.com
amirone.com
deal-enjoy.com
dogtrainingtips.club
maricopasimplesold.com
amirmedhat.com
dragopro.com
iaahfr.com
necessessory.com
brisbanefleetservicing.com
woundhealth.info
v3gan.coffee
defiwalletapp.com
texasvirtualhomebuyers.com
freelancerjobz.com
or-not.net
lpsmn.net
summitzero.net
leanovator.com
babyballhead.com
heirtothethrone.com
himalayandiscovery.com
alvarezmotos-13.com
linhkienht.com
khamac.com
pindobalvendas.com
ejercitodelairevirtual.online
businessnay.com
myworldsocialnetwork.com
289215.com
ontheplanetzero.com
kritisolution.com
massteck.com
500accfree.xyz
theangledgroup.com
qf464.com
jibunrasisa.com
bensily.com
lyncdevice.com
Targets
-
-
Target
SWIFT Payment DOOEL EUR 74,246.41 20210101950848.exe
-
Size
895KB
-
MD5
b8ead540e40416915bd3f6134f2017bb
-
SHA1
e74cf3642e4bd4b3f616bc5230edd5312d97ecfc
-
SHA256
201f068c15e749ce1d3bd1a8e48909a9b0e8e5b0774b0eb2abc9096449fdbe67
-
SHA512
1e5631249b531d0abf6f3603016ec1e06d3efe55bae91c8db116ab5c94f126473448bf78338163a8cbc526bb168d70933014222150afbb9270a08303f0963002
-
Xloader Payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-