General
-
Target
SecuriteInfo.com.W32.AIDetect.malware1.21548.21059
-
Size
208KB
-
Sample
210430-yb2dn4yqy6
-
MD5
e1d2d58d1297d6a7247a37733ed5c211
-
SHA1
3095d661636ce6b4907d6bcce04e978ca78b3a91
-
SHA256
3366d2fe9920bad37be4e872bf1cc17af32be4e55828a2efd28e7ebf517253a8
-
SHA512
3dc9281179aa2f7ec9173d6c6a3068a6a1118891b7e357d2308459ca89469a55d109b37f3f728c473a488fe82f004ac06805198ae779fe8b462a413a6b13401d
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetect.malware1.21548.21059.exe
Resource
win7v20210408
Malware Config
Extracted
xloader
2.3
http://www.citestaccnt1597666144.com/ud9e/
casezs.com
gascubby.com
pekodains.com
superskosh.com
avktinfracon.com
slink.finance
thegreathopeofearth.com
thebattleofthestars.com
utmxpxq.icu
mamaandbabycleaningservice.com
officialtimelessbeauty.com
keeper.network
leyingcp.com
helpforharrysheroes.com
cohenforleehealthboard.com
wsilhavy.net
logisticsconsultinglimited.com
btechnician.com
dynamicpersiankitten.com
nuplaz.com
localrealtypros.com
thamtuchuyentam.com
teiegraaf.com
halloweensweet.com
challengerburgess.com
martinsburgmethadone.com
peapatchvideo.com
gungoretiket.com
princesssexyluxwear.com
inlogservices.com
birrificiobastardo.com
meflyingbird.com
fishbasketapp.com
cbluebaytvwdmall.com
ceyrox.com
roanokevalleyautoparts.com
kunharindia.com
disneycollevtion.com
ullaskclc.com
businessresolve360.com
tignatine.com
aucpaimai.com
melfisherssilverbar.com
aimages.xyz
directsourc.com
kssunflowercoffee.com
enthuqsjhiasm.com
by-khaira.com
livetrancoso.com
muaythaiparaiba.com
check999.com
idahozip.com
jiguangtech.com
wondermadecreative.com
pigift.site
jomepc.com
kimsnagelstudiodiemen.com
tropicaliacalcados.com
jifang.xyz
bestreviews24x7.com
purehealings.com
contorig2.com
banirestaurant.com
ficvgroup.com
Targets
-
-
Target
SecuriteInfo.com.W32.AIDetect.malware1.21548.21059
-
Size
208KB
-
MD5
e1d2d58d1297d6a7247a37733ed5c211
-
SHA1
3095d661636ce6b4907d6bcce04e978ca78b3a91
-
SHA256
3366d2fe9920bad37be4e872bf1cc17af32be4e55828a2efd28e7ebf517253a8
-
SHA512
3dc9281179aa2f7ec9173d6c6a3068a6a1118891b7e357d2308459ca89469a55d109b37f3f728c473a488fe82f004ac06805198ae779fe8b462a413a6b13401d
-
Xloader Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-