General
-
Target
VSL_MV SEA-BLUE SHIP OWNERS.exe
-
Size
288KB
-
Sample
211123-b3kr6acce2
-
MD5
0b1723d1301f6c728884ecd4d7d0ae03
-
SHA1
ae99846517dfd9c3c69ec13285d089ca68419cda
-
SHA256
2e8dbbac127f620f64817f3674be70bb481ed70e89796f387caed0a11229540c
-
SHA512
5880ef204c1505200426e1f33af75e064cb425866e68644b4f0ba7d235bc6e273017a22889a6869e146efdaff674c37cd10b416ee9d4d94e3681d1a1dc609d5c
Static task
static1
Behavioral task
behavioral1
Sample
VSL_MV SEA-BLUE SHIP OWNERS.exe
Resource
win7-en-20211014
Malware Config
Extracted
xloader
2.5
e8ia
http://www.helpfromjames.com/e8ia/
le-hameau-enchanteur.com
quantumsystem-au.club
engravedeeply.com
yesrecompensas.lat
cavallitowerofficials.com
800seaspray.com
skifun-jetski.com
thouartafoot.com
nft2dollar.com
petrestore.online
cjcutthecord2.com
tippimccullough.com
gadget198.xyz
djmiriam.com
bitbasepay.com
cukierniawz.com
mcclureic.xyz
inthekitchenshakinandbakin.com
busy-clicks.com
melaniemorris.online
elysiangp.com
7bkj.com
wakeanddraw.com
ascalar.com
iteraxon.com
henleygirlscricket.com
torresflooringdecorllc.com
helgquieta.quest
xesteem.com
graffity-aws.com
bolerparts.com
andriylysenko.com
bestinvest-4-you.com
frelsicycling.com
airductcleaningindianapolis.net
nlproperties.net
alkoora.xyz
sakiyaman.com
wwwsmyrnaschooldistrict.com
unitedsafetyassociation.com
fiveallianceapparel.com
edgelordkids.com
herhauling.com
intelldat.com
weprepareamerica-planet.com
webartsolution.net
yiquge.com
marraasociados.com
dentalimplantnearyou-ca.space
linemanbible.com
dunamisdispatchservicellc.com
latamoperationalinstitute.com
stpaulsschoolbagidora.com
groupninemed.com
solar-tribe.com
footairdz.com
blttsperma.quest
xfeuio.xyz
sahodyafbdchapter.com
0934800.com
dandftrading.com
gladway.net
mineriasinmercurio.com
inaampm.com
Targets
-
-
Target
VSL_MV SEA-BLUE SHIP OWNERS.exe
-
Size
288KB
-
MD5
0b1723d1301f6c728884ecd4d7d0ae03
-
SHA1
ae99846517dfd9c3c69ec13285d089ca68419cda
-
SHA256
2e8dbbac127f620f64817f3674be70bb481ed70e89796f387caed0a11229540c
-
SHA512
5880ef204c1505200426e1f33af75e064cb425866e68644b4f0ba7d235bc6e273017a22889a6869e146efdaff674c37cd10b416ee9d4d94e3681d1a1dc609d5c
-
Xloader Payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-