General
-
Target
swift copy.exe
-
Size
435KB
-
Sample
211122-s9r89afhdj
-
MD5
21b61d0f7522982ef7dc291382b431db
-
SHA1
8c2a65bbcbdc5dab33519bdb8a068ea6e14b6296
-
SHA256
a8c5b384b32f2a117fda2336ec2692bfc44e37a56327217454b63eb28ec0701b
-
SHA512
9ad5d171d1e3b6d3b757ffce2941888d82b63229fd22115a96ceed1b8efacfde42095731ce98fea409fbb8fd8b4a2988cbe9de2afafb77513638b6eea15a2241
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.exe
Resource
win7-en-20211104
Malware Config
Extracted
xloader
2.5
ea0r
http://www.asiapubz-hk.com/ea0r/
lionheartcreativestudios.com
konzertmanagement.com
blackpanther.online
broychim-int.com
takut18.com
txstarsolar.com
herdsherpa.com
igorshestakov.com
shinesbox.com
reflectpkljlt.xyz
oiltoolshub.com
viralmoneychallenge.com
changingalphastrategies.com
mecitiris.com
rdadmin.online
miniambiente.com
kominarcine.com
pino-almond.com
heihit.xyz
junqi888.com
metalumber.com
sclvfu.com
macanostore.online
projecturs.com
ahcprp.com
gztyfnrj.com
lospacenos.com
tak-etranger.com
dingermail.com
skiin.club
ystops.com
tnboxes.com
ccafgz.com
info1337.xyz
platinum24.top
hothess.com
novelfinancewhite.xyz
theselectdifference.com
flufca.com
giftcodefreefirevns.com
kgv-lachswehr.com
report-alfarabilabs.com
skeetones.com
4bcinc.com
americamr.com
wewonacademy.com
evrazavto.store
true-fanbox.com
greencofiji.com
threecommaspartners.com
hgtradingcoltd.com
xihe1919.com
241mk.com
helplockedout.com
wefundprojects.com
neosecure.store
purenewsworldwide.com
luckylottovip999.com
lottidobler.com
proyectohaciendohistoria.com
raintm.com
theproducerformula.com
trademarkitforyourself.com
ottaweed.com
Targets
-
-
Target
swift copy.exe
-
Size
435KB
-
MD5
21b61d0f7522982ef7dc291382b431db
-
SHA1
8c2a65bbcbdc5dab33519bdb8a068ea6e14b6296
-
SHA256
a8c5b384b32f2a117fda2336ec2692bfc44e37a56327217454b63eb28ec0701b
-
SHA512
9ad5d171d1e3b6d3b757ffce2941888d82b63229fd22115a96ceed1b8efacfde42095731ce98fea409fbb8fd8b4a2988cbe9de2afafb77513638b6eea15a2241
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-