General
-
Target
RE New order.exe
-
Size
774KB
-
Sample
210420-mjh8mgvmwa
-
MD5
752c086496f2301ef7e95cc0a710c786
-
SHA1
9cb8456136462d69dfd073b43707fa9eee7d09a7
-
SHA256
beb1862a3b194a840605b7f030f0285fff18fadfc4199c3da007f44b7ad19292
-
SHA512
d9a4a2bce07b613ce55f1cfe085faa5a1381cb0fb60f7d80c0eb7c279bbadb5e2f949adab5ed488ffaf238f5963b3978d4483bca40dac556ccb1aed4f2002a39
Static task
static1
Behavioral task
behavioral1
Sample
RE New order.exe
Resource
win7v20210408
Malware Config
Extracted
xloader
2.3
http://www.mipecvinh-heritage.com/bfak/
beautifulhairbabe.com
smartlegal.info
posgradeadunica.com
suitefleetdms.com
dlxlcarbon.com
wongtangstore9.host
saintsimonsparkneighborhood.com
racevx.xyz
mooniswap.farm
healthymantra.store
igualandocaminos.com
eclecticblerd.com
reasonofsmilefoundation.com
thechallenge.party
smallbusinessesforgolden.com
yihuyifu.com
escalategear.com
lnanhhealthcareers.com
makeupkacie.com
gccrewauction.com
kcosmoprof.com
dreamfocuslove.com
smsstm.com
warwickhouseofpizzamenu.com
comfortplusindia.com
defiswaponline.com
soundbathclass.com
lazyfears.com
canopus-strategy.com
terreatoir.com
efficiencyexpertstt.com
environmentologyblog.com
ogdenbankruptcylawyer.com
9iyg.com
miawezon.com
anjuliesmusic.com
trucksinrochester.com
para-learning.com
1frivgames.com
citii-groupss.site
doesthecatdie.com
suckhoevangnvp.site
connectionsacademy.sucks
caminosviajeros.com
acadiananetwork.com
longlife.online
rattankw.com
campoyabolivia.com
mymindismyown.com
hansa-logistics.com
1transformationstation.com
prometheumcapital.com
artagayne.com
faneciecloset.com
tarynlaakso.com
jevcic.com
t2t-hprc-2020conference.com
arsitastudio.com
ahoradoacs.com
keyboarding-typing.com
acgtea.club
thehouseluxury.com
eatmybet.com
sakshamsacademy.com
Targets
-
-
Target
RE New order.exe
-
Size
774KB
-
MD5
752c086496f2301ef7e95cc0a710c786
-
SHA1
9cb8456136462d69dfd073b43707fa9eee7d09a7
-
SHA256
beb1862a3b194a840605b7f030f0285fff18fadfc4199c3da007f44b7ad19292
-
SHA512
d9a4a2bce07b613ce55f1cfe085faa5a1381cb0fb60f7d80c0eb7c279bbadb5e2f949adab5ed488ffaf238f5963b3978d4483bca40dac556ccb1aed4f2002a39
-
Xloader Payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-