General
-
Target
swift.exe
-
Size
838KB
-
Sample
211111-hgw2mafhgp
-
MD5
dae40883df63939076b90643ea59bc79
-
SHA1
cb5d1491347cc417bcc1d1e4090c8d6da787daec
-
SHA256
9f1a46f25ff46ddc69bb64b4bffbf628e41eb6c4820c617bfb06fd287e8cd08a
-
SHA512
a709fceca7430ae88e4d2d68bb166337820519293fbad8ec118c132ba0cf04872f75d3d27876a2589f8c6db31eee368f1882c9a5a654821370a0ffea4820cb8a
Static task
static1
Behavioral task
behavioral1
Sample
swift.exe
Resource
win7-en-20211104
Malware Config
Extracted
xloader
2.5
rqan
http://www.cardboutiqueapp.com/rqan/
panda.wiki
gailkannamassage.com
ungravitystudio.com
coraggiomusicschool.com
51walkerstreetrippleside.com
infemax.store
mapara-foundation.net
elitespeedwaxs.com
manateeprint.com
thelocksmithtradeshow.com
phoenix-out-of-ashes.com
marionkgregory.store
abasketofwords.com
century21nokta.com
anthonyaarnold.com
forevermyanmar.com
ramashi.com
uniquecarbonbrush.com
packecco.com
appelnacrtl.quest
mayo-group.com
healthychefla.com
chuhaitalk.com
promoapp12.com
sergomosta.com
missuniversepr.com
onfinan.com
moyue27.com
miaocharge.com
hubmedia.digital
sarasota-pressurewashing.com
deliciousrecipe.xyz
rosalia-pilates-angers.com
qqsmt09.com
comercialjyv.com
ismarthings.com
b8ceex.com
reviewbyornex.online
familylovmix.com
wurzelwerk-sk.com
buratacoin.com
delocdinh.com
paraspikakasino.com
buyinsurance24.com
d1storesa.com
apollonfitnessvrn.club
tokofebri.store
cambabez.xyz
pointcon.net
digitalcoursepreneur.com
15dgj.xyz
mg-garage.com
claggs.com
yuezhong66.com
uvowtae.xyz
puutuisossa.quest
glitchpunks.art
haferssippe.quest
ucwykl.biz
finlandtwo.xyz
efterpisart.com
usbankofamerican.com
bamubusinesssolutions.com
lakshhomesbalram.info
Targets
-
-
Target
swift.exe
-
Size
838KB
-
MD5
dae40883df63939076b90643ea59bc79
-
SHA1
cb5d1491347cc417bcc1d1e4090c8d6da787daec
-
SHA256
9f1a46f25ff46ddc69bb64b4bffbf628e41eb6c4820c617bfb06fd287e8cd08a
-
SHA512
a709fceca7430ae88e4d2d68bb166337820519293fbad8ec118c132ba0cf04872f75d3d27876a2589f8c6db31eee368f1882c9a5a654821370a0ffea4820cb8a
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-