General
-
Target
Order-CNS Amura Precision Co., Ltd 9A210118KR.exe
-
Size
252KB
-
Sample
210727-77s4ht51jj
-
MD5
f02f2961032796a25c7e090bb4f70566
-
SHA1
8c530a1533800db7d8dea165ea93421e2c996dad
-
SHA256
7a34064785bd677a927fa90988d9001aed285762f230d0fe08db7b2ca89ce987
-
SHA512
92df5ef56be6a6f5eeaeeb9b11559ca0a2960de9e7e0ba3a24308d603fa7be3375e41f7a618b6d02a4d7739b3ac75ba91203bf2ecfe963689539bc05dcdb0507
Static task
static1
Behavioral task
behavioral1
Sample
Order-CNS Amura Precision Co., Ltd 9A210118KR.exe
Resource
win7v20210410
Malware Config
Extracted
xloader
2.3
http://www.skelligsseasafari.com/dzqd/
weekendsday.com
kansasfriedchiken.com
bestselfdrive.com
timeleveragechallenge.com
theunboxiblenation.net
adriaeurope-group.com
acrylicphotobloc.com
theincentivized.com
histreetbutler.com
kumamkt.com
cutepuppyspot.store
crisp-ui.com
easyecotour.com
longshotloungeenglewood.com
esotericclothingco.com
henglai58.com
handmadecircles.com
k9itsrk940aeq6.xyz
service-it-net.com
rt-p-c-14h9-1elk-jpzs.com
bellhavensodabay.com
allinonecup.com
clong-tech.com
youyouwuliu.com
howifuckedthisup.com
newsbow.com
ghanaforums.com
scottslondon.com
everyonelovesmomo.com
saborlatinoonlinetv.com
mrplumbergrayson.com
oneofakinddrafting.com
studentbackers.com
getawayspizza.com
ofhad.com
robertanthonyhmua.com
wynburgpharma.com
hqplaytvall.xyz
magetu.info
onewarriornation.faith
ayzulcreatives.com
domaine-bertheauville.com
globalrich.net
chapeloflovevegas.com
primefoodny.com
mirachristaclothing.com
tecnomkt.net
arianstyle.com
muzhik-seks.site
sodapc.com
noterii.com
aadvarkpublishing.com
eastneuknow.com
queencitysupper.com
ymzan.com
kronosftw.online
justqualityconstruction.com
infosupend.info
zshled.com
persylondon.com
andersonchristopher.com
flourishingcommons.com
alfonsodomecq.com
6cify-848.net
Targets
-
-
Target
Order-CNS Amura Precision Co., Ltd 9A210118KR.exe
-
Size
252KB
-
MD5
f02f2961032796a25c7e090bb4f70566
-
SHA1
8c530a1533800db7d8dea165ea93421e2c996dad
-
SHA256
7a34064785bd677a927fa90988d9001aed285762f230d0fe08db7b2ca89ce987
-
SHA512
92df5ef56be6a6f5eeaeeb9b11559ca0a2960de9e7e0ba3a24308d603fa7be3375e41f7a618b6d02a4d7739b3ac75ba91203bf2ecfe963689539bc05dcdb0507
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-