General
-
Target
d6742c917817f02e01ba40c61606b3707f373bb8d1f525b75b72b1802cd9b290
-
Size
907KB
-
Sample
211103-kglxrsaehm
-
MD5
61d62155465f85f8fc4d44a89e7ae831
-
SHA1
10e1e0c049b58ff662f960a3e5270bfb97c9868b
-
SHA256
d6742c917817f02e01ba40c61606b3707f373bb8d1f525b75b72b1802cd9b290
-
SHA512
b77514d0de8c8582a3773fd76b82049bdc8dbba090827531ff1452d6729bc74eeb389f69701bf38b8b45a7fcebec62d12c26d5abab7e0516bb5cf78dc7dbeb24
Static task
static1
Malware Config
Extracted
xloader
2.5
rqan
http://www.cardboutiqueapp.com/rqan/
panda.wiki
gailkannamassage.com
ungravitystudio.com
coraggiomusicschool.com
51walkerstreetrippleside.com
infemax.store
mapara-foundation.net
elitespeedwaxs.com
manateeprint.com
thelocksmithtradeshow.com
phoenix-out-of-ashes.com
marionkgregory.store
abasketofwords.com
century21nokta.com
anthonyaarnold.com
forevermyanmar.com
ramashi.com
uniquecarbonbrush.com
packecco.com
appelnacrtl.quest
mayo-group.com
healthychefla.com
chuhaitalk.com
promoapp12.com
sergomosta.com
missuniversepr.com
onfinan.com
moyue27.com
miaocharge.com
hubmedia.digital
sarasota-pressurewashing.com
deliciousrecipe.xyz
rosalia-pilates-angers.com
qqsmt09.com
comercialjyv.com
ismarthings.com
b8ceex.com
reviewbyornex.online
familylovmix.com
wurzelwerk-sk.com
buratacoin.com
delocdinh.com
paraspikakasino.com
buyinsurance24.com
d1storesa.com
apollonfitnessvrn.club
tokofebri.store
cambabez.xyz
pointcon.net
digitalcoursepreneur.com
15dgj.xyz
mg-garage.com
claggs.com
yuezhong66.com
uvowtae.xyz
puutuisossa.quest
glitchpunks.art
haferssippe.quest
ucwykl.biz
finlandtwo.xyz
efterpisart.com
usbankofamerican.com
bamubusinesssolutions.com
lakshhomesbalram.info
Targets
-
-
Target
d6742c917817f02e01ba40c61606b3707f373bb8d1f525b75b72b1802cd9b290
-
Size
907KB
-
MD5
61d62155465f85f8fc4d44a89e7ae831
-
SHA1
10e1e0c049b58ff662f960a3e5270bfb97c9868b
-
SHA256
d6742c917817f02e01ba40c61606b3707f373bb8d1f525b75b72b1802cd9b290
-
SHA512
b77514d0de8c8582a3773fd76b82049bdc8dbba090827531ff1452d6729bc74eeb389f69701bf38b8b45a7fcebec62d12c26d5abab7e0516bb5cf78dc7dbeb24
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-