General
-
Target
RFQ#220125.exe
-
Size
595KB
-
Sample
220126-h9ja8sagd4
-
MD5
51b137c2472e0851e8ea67ac87bac9a2
-
SHA1
a351cc4041d0c68eca519c73c26e98cceb883329
-
SHA256
ac9e5b47d04e1bbf51afdf5ede13d16ad23dadb174eb3ac0aec1c26d255b807d
-
SHA512
fb8daa0fbfa1378153a35a8f9c9dd551dd9104b3ef25109c8f71c6ebd9ba0a7133e490fd9e4f8c71d759f073de7a398cd04739c88ba60b8f83c3d2e8400ba32d
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#220125.exe
Resource
win7-en-20211208
Malware Config
Extracted
xloader
2.5
s9ne
digital-performance-award.com
fioratti.xyz
designluxre.com
cngangdun.com
restaurantperladelmare.com
davinci65.info
glossmans.com
firstsmileimaging.com
indevmobility.biz
mvptcodesupport.com
crustenc.net
raleighsportsacademy.com
boytoyporn.com
rojaspass.com
acmepaysage.fr
shopatdean.xyz
leonergsteve18870.com
elnahuel.com
ils.network
canto-libero.com
bracknellglazingcommercial.com
jordanontheshirts.com
pnwpickleballclub.com
studibucks.com
stevesbbcards.com
pingerton.online
wincrestadvisors.com
fabiulaezeca.com
internationally.info
alianzaporextremadura.com
annianzu.icu
suryaweb.host
uh6or9.com
burceh5.store
herbalmedication.xyz
taiquandao.net
duongkhanglinh.club
endokc.com
fourjuicydeny.com
shengyuantongfs.com
sport-laboratory.com
redesignpain.com
hedefcapitals33.com
nhealthcareservices.online
exodicuis.com
hottubsswimspascoralsprings.com
louiecruzbeltran.info
sherrilyndale.com
ohneulmum.quest
adopteunper.com
windpeople.store
mypagbound.com
cargopremier.com
amichekadota.quest
efootballpro2022.net
jeeaner.com
clasiquitos.com
rockyal.xyz
vnpmhs.com
cnshuanglai.com
ratawatakara.com
stc-ksa.com
happy-bihada.space
flirty-little-secret.com
woodentoysforkids.store
Targets
-
-
Target
RFQ#220125.exe
-
Size
595KB
-
MD5
51b137c2472e0851e8ea67ac87bac9a2
-
SHA1
a351cc4041d0c68eca519c73c26e98cceb883329
-
SHA256
ac9e5b47d04e1bbf51afdf5ede13d16ad23dadb174eb3ac0aec1c26d255b807d
-
SHA512
fb8daa0fbfa1378153a35a8f9c9dd551dd9104b3ef25109c8f71c6ebd9ba0a7133e490fd9e4f8c71d759f073de7a398cd04739c88ba60b8f83c3d2e8400ba32d
-
Xloader Payload
-
Blocklisted process makes network request
-
Deletes itself
-
Suspicious use of SetThreadContext
-