General
-
Target
Purchase Order no.202201EYL-01.exe
-
Size
163KB
-
Sample
211115-vjyz8abac8
-
MD5
bf3176a88b749246b4294096531f97ca
-
SHA1
34ae702a189c937a26dd8066466d43a3ef756b61
-
SHA256
2ff3a8569873600f75e011be4ead5896a408672e43b15008679692557f6dc6c9
-
SHA512
a75d6c7e362c06ae248b830bd91ec75730116461e7f6bc93c16ffc7c619c7eff8282a83439fffdae31ea401e6629db31ef8d36f041d6c08f353a5758c09f3327
Behavioral task
behavioral1
Sample
Purchase Order no.202201EYL-01.exe
Resource
win7-en-20211104
Malware Config
Extracted
xloader
2.5
46uq
http://www.jixelbbk.com/46uq/
spiritueleonlinetraining.online
jrpz86.com
dataxmart.com
zeogg.club
killiandooley.com
159studios.com
clginter.com
greenwirechicago.com
kennycheng.tech
carolyngracecoaching.com
cp-altodelamuela.com
amazonflowerjewelry.com
anseron.net
surplusqlxbjy.online
asasal.com
online-buy-now.com
kolab.today
statisticsacademy.com
dcupqiu.club
braxtynmi.xyz
bcw.today
stilteruimtes.online
etihadit.com
xihoatuoi.com
fetch-an-us-borrow-money.zone
yooliaphotography.com
ooaz2.xyz
ssss.host
impossiblegrow.com
neilserver.website
renewable-energy-products.com
daywestskincare.com
esmexport.com
carrofrance.com
xiaoxiaodao.club
sterlingmktg.com
txcyclerepair.com
embas.online
interpol-inter.com
piaohua66.com
jollyprime.com
urbanphonecase.com
parareda.net
bursadavarbursadanal.com
emresonfry.com
sharkfangs.com
beepboople.com
ordenmorgi.quest
bdqimeng666.top
workforma.com
vintageknollsapartments.com
alienguise.com
id-923783.space
scj-bos.com
polebear.website
pharmacyle.com
viridishelf.com
abros88.com
ocdpsych.com
gulfandinlandlimited.com
turkishqlxmpw.online
suddennnnnnnnnnnn14.xyz
copyshopetc.net
cursos24-7.online
Targets
-
-
Target
Purchase Order no.202201EYL-01.exe
-
Size
163KB
-
MD5
bf3176a88b749246b4294096531f97ca
-
SHA1
34ae702a189c937a26dd8066466d43a3ef756b61
-
SHA256
2ff3a8569873600f75e011be4ead5896a408672e43b15008679692557f6dc6c9
-
SHA512
a75d6c7e362c06ae248b830bd91ec75730116461e7f6bc93c16ffc7c619c7eff8282a83439fffdae31ea401e6629db31ef8d36f041d6c08f353a5758c09f3327
-
Xloader Payload
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Deletes itself
-
Suspicious use of SetThreadContext
-