General
-
Target
MV ULTRASONIC_PDA$62,000.exe
-
Size
287KB
-
Sample
220120-kc1kcshadq
-
MD5
238fa7f1204998f7b13571649e15508a
-
SHA1
e130539aee3a44c1902016476eb9f4304976aa4d
-
SHA256
3f76d69c552a61ab3d1207fb64ac3aecf812e98f99c5413a9472d59859c38077
-
SHA512
53c571454bd46209555718f97cb4b35c4dce038e52ec2a4d6a8c9315bacf569259ee3c511fc8e26c42a15739a91f8988339610c34d322a0c44c38dc92c6c3e41
Static task
static1
Behavioral task
behavioral1
Sample
MV ULTRASONIC_PDA$62,000.exe
Resource
win7-en-20211208
Malware Config
Extracted
xloader
2.5
igwa
listingswithalex.com
funtabse.com
aydenwalling.com
prochal.net
superfoodsnederland.com
moldluck.com
dianekgordon.store
regionalhomescommercial.com
mysecuritymadesimple.com
malwaremastery.com
kodaikeiko.com
jrzg996.com
agricurve.net
songlingjiu.com
virginianundahfishingclub.com
friendschance.com
pastelpresents.com
answertitles.com
survival-hunter.com
nxfddl.com
traditionnevertrend.com
agrovessel.com
unicorm.digital
cucumboy.com
alemdogarimpo.com
laraful.com
hexwaa.com
hanu21st.com
knoycia.com
qishengxing.com
gopipurespices.com
fdkkrfidkdslsieofkld.info
elephantspublications.online
valeriebeijing.com
xn--42cg2czax6ptae6a.com
2shengman.com
sfcshavedice.com
ragworkhouse.com
stardomfrokch.xyz
exoticcenterfold.com
eventosartifice.com
test-order-noren.com
110bao.com
face-pro.online
freedomoff.com
futuresep.com
tremblock.com
chocolat-gillotte.com
speclove.com
ddflsl.com
goodnewsmbc.net
cloudtotaal.com
goapps-auth.com
ouch247max.com
sabra-sd.com
luxuryneverhurt.art
rxvendorpills.online
ludowinners.online
placemyorder.online
skyrim.company
monsterlecturer.com
controle-fiscal.com
phoenixinjurylawyer.online
nanoheadgames.com
toposales.com
Targets
-
-
Target
MV ULTRASONIC_PDA$62,000.exe
-
Size
287KB
-
MD5
238fa7f1204998f7b13571649e15508a
-
SHA1
e130539aee3a44c1902016476eb9f4304976aa4d
-
SHA256
3f76d69c552a61ab3d1207fb64ac3aecf812e98f99c5413a9472d59859c38077
-
SHA512
53c571454bd46209555718f97cb4b35c4dce038e52ec2a4d6a8c9315bacf569259ee3c511fc8e26c42a15739a91f8988339610c34d322a0c44c38dc92c6c3e41
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Sets service image path in registry
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-