General
-
Target
Swift copy.r00
-
Size
330KB
-
Sample
211021-aq8g1safam
-
MD5
ce5cc93ba82023d5e8937817b21ae02c
-
SHA1
1b75291586b19f9c71a67c527c5ec755ee2014d2
-
SHA256
163a5b1e5e3c3a30cd0502f6e6b93e0f493ceaade091d5841a2143210894522b
-
SHA512
8e41db71ece816aaf9201d19f6e18c92d827d2778f2b70a0306cda2ee51d1befc35d8909aac02da65c148b90155e51eaa175f5b668df617faf3760d95646b8f1
Static task
static1
Behavioral task
behavioral1
Sample
Swift copy.exe
Resource
win7-en-20210920
Malware Config
Extracted
xloader
2.5
snec
http://www.go2payme.com/snec/
sacramentoscoop.com
auroraeqp.com
ontactfactory.com
abenakigroup.com
xander-tech.com
cocaineislegal.com
carbondouze.com
louisvilleestatelawyer.com
sundaytejero.quest
arti-faqs.com
thisandthat.store
biodyne-el-salvador.com
18504seheritageoakslane.com
mfialias.xyz
whitestoneclo.com
6288117.com
oficiosuy.com
autogift.xyz
wallbabyshell.com
chaletlabaie.com
yy88kk.com
thepositiveenergycompany.com
personalexpressofertachegou.com
theoldplayground.com
aireapartmentsmsp.com
layfflj.com
xn--hss-s83bwm.com
tutoeasy.com
maintrove.com
changereferral.com
peanutl.com
portolaenterprise.com
vanscn.net
2wawaw16.me
gosatya.com
velocityphase.com
aprenda-sg-sst.com
dickinsonoutfitters.com
toptelecast-toreadtoday.info
argana.store
tagachiweb.com
bokepindoviral.com
nu865ci.com
thestogiestore.com
managexxxxx.com
japanskirt.com
leilaniheritage.com
m7chi.net
afjewelryaz.com
aset.guide
hx-banjin.com
foqenoa.store
kolkataescort.xyz
worldcrgenius.biz
stockandberry.com
ash-tag.com
orchestrated.design
point4sales.com
sattaking-delhiborder06.xyz
clear-rails.com
dentalpnid.com
ezekielgroup.com
17804maritimepoint101.com
qldrfb.com
Targets
-
-
Target
Swift copy.exe
-
Size
375KB
-
MD5
480c3e5e116382f76da67e92b0c06b5d
-
SHA1
77e95fea7b8afcce773e8c3592e199c71dd03172
-
SHA256
2c78fa1d90fe76c14f0a642af43c560875054e342bbb144aa9ff8f0fdbb0670f
-
SHA512
5798198704ff3b3db9d7f4037db9c4b6315faa77c2f330e70fc68c081ff9c96e7753d6ab871e4024b8d630649bbd682816fd96d4c6766164839be6b4431d985c
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Xloader Payload
-
Executes dropped EXE
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-