General
-
Target
ORDER-ASLF1SR00116 40HC 21T05 DALIAN TO GENOVA.exe
-
Size
944KB
-
Sample
210806-l5dwrn21jx
-
MD5
5d5276be06b293b3fe9f5acf12cf59f8
-
SHA1
beb5812c8d6556ea2dfc0d34c43f2fc9ff0cbc60
-
SHA256
c4d1d6a9baaeb3802cfb9f7e21db83b85236844b62dc05f8ed4822e491703eb3
-
SHA512
65e1f8faeb145888a059bf4a9d4d0fce144ff07c579414bb59b2c6d2fc6e7c3a796f72fdae6568be4f5368308203a37b14bf1744cb57d3e36ab95bc00d09b10c
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-ASLF1SR00116 40HC 21T05 DALIAN TO GENOVA.exe
Resource
win7v20210408
Malware Config
Extracted
xloader
2.3
b8eu
http://www.yummylipz.net/b8eu/
ppslide.com
savorysinsation.com
camilaediego2021.com
rstrunk.net
xianshikanxiyang.club
1borefruit.com
ay-danil.club
xamangxcoax.club
waltonunderwood.com
laurabissell.com
laurawmorrow.com
albamauto.net
usamlb.com
theoyays.com
freeitproject.com
jijiservice.com
ukcarpetclean.com
wc399.com
xn--pskrtmebeton-dlbc.online
exclusivemerchantsolutions.com
kkkc5.com
kakashis.club
minldsrvlceacvtlvty.net
tucantec.com
dreamlivehope.com
tayruaeco.com
wgaoutdoors.com
obersrock.com
notosickness.com
carporttube.com
customcbdgroup.com
vincentstreetdental.site
fidatosas.com
soft-drill.com
thelearningcountscompany.com
brateix.info
sexting-sites.com
wheredidmystokego.com
alorve.com
cataractmeds.com
purhenna.com
slicesystem.com
xn--v4q8fq9ps1clx5d774b.com
tuffysfight.com
dongtaykethop.cloud
thedesertwellness.com
maxridetubes.com
jungbo33.xyz
rokitrevs.com
fsoinc.com
bartelmefamily.com
greenresearch.farm
wws520.com
scoutandstellar.com
therachelfrankshow.com
rastrosomostodos.com
jqxfinance.com
escortsoslo.com
ocd-diesel.com
domainedelafrouardiere.com
9adamtech.com
omniheating.com
dpymenus.com
sellingonlineschool.com
Targets
-
-
Target
ORDER-ASLF1SR00116 40HC 21T05 DALIAN TO GENOVA.exe
-
Size
944KB
-
MD5
5d5276be06b293b3fe9f5acf12cf59f8
-
SHA1
beb5812c8d6556ea2dfc0d34c43f2fc9ff0cbc60
-
SHA256
c4d1d6a9baaeb3802cfb9f7e21db83b85236844b62dc05f8ed4822e491703eb3
-
SHA512
65e1f8faeb145888a059bf4a9d4d0fce144ff07c579414bb59b2c6d2fc6e7c3a796f72fdae6568be4f5368308203a37b14bf1744cb57d3e36ab95bc00d09b10c
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-