General
-
Target
cxl.exe
-
Size
440KB
-
Sample
211005-p8pvysabcr
-
MD5
f51da2ac8cdfc1ff41921f0fceee4514
-
SHA1
f910ed6637480ff6930df72d9258029641a186ba
-
SHA256
f89bda22f77706b290e5f56032cd4c884f8da016a379f6c6a978acf4983f0175
-
SHA512
830f6fadf25b3b839d648a71e82eb3fb37c0e5376d5ce76044a39321ab54f356cec4f9a8ef08f01ebe2d86b6e6643a24a591b680ab2f88c29ecb8e43e837ed46
Static task
static1
Behavioral task
behavioral1
Sample
cxl.exe
Resource
win7-en-20210920
Malware Config
Extracted
xloader
2.5
noha
http://www.mglracing.com/noha/
iphone13promax.support
trailer-racks.xyz
overseaspoolservice.com
r2d2u.com
dawajeju.com
nextgenproxyvote.com
xn--vhqp8mm8dbtz.group
commonsenserisk.com
cmcqgxtyd.com
data2form.com
bois-applique.com
originallollipop.com
lj0008lj.net
spfldvaccineday.info
phalcosnusa.com
llcmastermachine.com
onlyforu14.rest
bestmarketingautomations.com
officialswitchmusic.com
thepretenseofjustice.com
authenticradio.net
standardizedsubmissions.com
aegnoshipping.com
478762.com
inclusionchecks.com
number-is-04.net
yyds9527.space
big-thought.com
controle2.email
groupninemed.com
fisworkdeck.com
imonbayazid.com
pixlrz.com
headlinebysmp.com
simulatefuck.com
efficientmother.com
wkshops22012.xyz
artehamburguer.com
beauallenpoetry.com
bonairemarathon.com
sprintfingers.com
ranbix.com
denghaoxin.club
jillianvansice.com
purpledge.com
mariadimitropoulou.com
surveyplanetgroup.tech
apocalyptoapertureserrature.net
cbd-cannabis.store
dirtcheapfire.com
xn--zbss74a16j.xn--czru2d
auth-appsgo.com
estchemdelat.space
kweeka.money
marketingtipsntricks.com
dayandwestbeauty.com
paddlercentral.com
nongminle.net
aodesai.store
evtasimaucretleri.com
micj7873.com
unarecord.com
zsnhviig.xyz
hallmark-transport.com
Targets
-
-
Target
cxl.exe
-
Size
440KB
-
MD5
f51da2ac8cdfc1ff41921f0fceee4514
-
SHA1
f910ed6637480ff6930df72d9258029641a186ba
-
SHA256
f89bda22f77706b290e5f56032cd4c884f8da016a379f6c6a978acf4983f0175
-
SHA512
830f6fadf25b3b839d648a71e82eb3fb37c0e5376d5ce76044a39321ab54f356cec4f9a8ef08f01ebe2d86b6e6643a24a591b680ab2f88c29ecb8e43e837ed46
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-