General
-
Target
Payment Slip.exe
-
Size
831KB
-
Sample
210927-rkar8shcbj
-
MD5
3d0d9c87ea732caf417afa0b8af62267
-
SHA1
dfb1e57a9cf498310cb7287f4b5792cbcd8b3974
-
SHA256
95b6ba2be30399f87d20e021bee29f0eb46773b67407f3ed9987d22610d5249d
-
SHA512
e7db51cd7baf84cf65ebead15c3e56ca9e381866a4edc7e945affe4f64f53bef08519037a5e4fc2ef8f8034e91b240b5d3511a2cdec08e308e8e473a7430a83b
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip.exe
Resource
win7v20210408
Malware Config
Extracted
xloader
2.5
qfff
http://www.yuumgo.academy/qfff/
lakechelanwedding.com
jengly.com
alluresme.com
axswallet.com
meetmedubai.com
kortzfamily.com
whishfullittles.com
mts-consultant.com
amhoses.com
hdaz2.xyz
lkgsbx.com
b0ay.com
hlthits.com
dicsordgift.com
bearaconnect.com
strategicpropertyventures.com
158393097102.xyz
officesetupofficesetup.com
industrynewz.com
uperionorthamerica.com
bucksmobilenotary.com
clangadget.com
jolix123.com
jch.computer
suddennnnnnnnnnnn43.xyz
binbin-ads.com
yshowmedia.com
studentpair.com
switchsmartcloud.com
vywubey.xyz
timdixonpreferredadvisors.com
sturlabas.com
kisskissfallinlove.com
ivyrtp.com
agohmarket.com
spiritair-tickets.com
savon-el.com
paccarfinanical.com
appios.xyz
auxilvascular.com
takesatisfy.club
noframespanishfly.com
nordesmarcom.com
hbportalweb.online
adhdwhatelse.com
reparamospc.com
footballrun.online
mygreatsport.com
onloe.com
wargasarawak.com
bhagwatiretail.com
00333v.com
relativewifi.com
transferarea.com
abodhakujena.com
covidworld.info
hetuart.com
legacytailors.com
inafukutest.com
tiplovellc.com
fruit-joy.com
bnzvb.com
calaverascoffee.com
interweavelife.com
Targets
-
-
Target
Payment Slip.exe
-
Size
831KB
-
MD5
3d0d9c87ea732caf417afa0b8af62267
-
SHA1
dfb1e57a9cf498310cb7287f4b5792cbcd8b3974
-
SHA256
95b6ba2be30399f87d20e021bee29f0eb46773b67407f3ed9987d22610d5249d
-
SHA512
e7db51cd7baf84cf65ebead15c3e56ca9e381866a4edc7e945affe4f64f53bef08519037a5e4fc2ef8f8034e91b240b5d3511a2cdec08e308e8e473a7430a83b
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Suspicious use of SetThreadContext
-