General
-
Target
Purchase Order.zip
-
Size
450KB
-
Sample
211124-tk28ladbbr
-
MD5
cb11d4aec422d5fe1888dffb6658786b
-
SHA1
38b9a9283316f49f1118ba40015234ed4940f657
-
SHA256
90bb88312aae8bd76973edfde5809a7fffcd0ff0f94a1938dfa5f6267803d414
-
SHA512
b2096561d0de4c9cffac9b8559f29623736a165158206a4b411258e7d614bcaefb0827d1af2a3d19c60d6c319a1ee32138e8f4c37697cb24b82c1ab3e4b779db
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-en-20211104
Malware Config
Extracted
xloader
2.5
ea0r
http://www.asiapubz-hk.com/ea0r/
lionheartcreativestudios.com
konzertmanagement.com
blackpanther.online
broychim-int.com
takut18.com
txstarsolar.com
herdsherpa.com
igorshestakov.com
shinesbox.com
reflectpkljlt.xyz
oiltoolshub.com
viralmoneychallenge.com
changingalphastrategies.com
mecitiris.com
rdadmin.online
miniambiente.com
kominarcine.com
pino-almond.com
heihit.xyz
junqi888.com
metalumber.com
sclvfu.com
macanostore.online
projecturs.com
ahcprp.com
gztyfnrj.com
lospacenos.com
tak-etranger.com
dingermail.com
skiin.club
ystops.com
tnboxes.com
ccafgz.com
info1337.xyz
platinum24.top
hothess.com
novelfinancewhite.xyz
theselectdifference.com
flufca.com
giftcodefreefirevns.com
kgv-lachswehr.com
report-alfarabilabs.com
skeetones.com
4bcinc.com
americamr.com
wewonacademy.com
evrazavto.store
true-fanbox.com
greencofiji.com
threecommaspartners.com
hgtradingcoltd.com
xihe1919.com
241mk.com
helplockedout.com
wefundprojects.com
neosecure.store
purenewsworldwide.com
luckylottovip999.com
lottidobler.com
proyectohaciendohistoria.com
raintm.com
theproducerformula.com
trademarkitforyourself.com
ottaweed.com
Targets
-
-
Target
Purchase Order.exe
-
Size
516KB
-
MD5
1a84232e14194f3ac154f8711d6f683e
-
SHA1
c735848eb56e7fbfe229918de1e042c238edb1a8
-
SHA256
8e405b6451c62462b5df1a0490175f4b9712ee1b1ab25a52f7e3a1f736400439
-
SHA512
1f697fcd5c22ecb1aec21e569f8624666cded36cf357b65213ff93c3245c396652e48252d114b17d8442452a395fd695be78b9f8a23e67ff9b98ebc16f85db95
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Xloader Payload
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-