General
-
Target
HIRE SOA JAN 2022.exe
-
Size
248KB
-
Sample
220126-j7arraahal
-
MD5
f7c0bc31aeb94707cdce8cf6abd4f099
-
SHA1
82725d581ae393a4fc5961f911e338f7a85e9683
-
SHA256
2e3edcdf1ab052a2e0fbd8ffdaf213876b3571b23ff74f5e157ce24a1155be81
-
SHA512
d2b36412ada4f8ddf052e55682b1ce523bc18b0c3203e064f7ec7da58b6433522c392cfd22d9435dc98186d850915938aa508131cb3bbf14c410e5f5c0bf4feb
Static task
static1
Behavioral task
behavioral1
Sample
HIRE SOA JAN 2022.exe
Resource
win7-en-20211208
Malware Config
Extracted
xloader
2.5
igwa
listingswithalex.com
funtabse.com
aydenwalling.com
prochal.net
superfoodsnederland.com
moldluck.com
dianekgordon.store
regionalhomescommercial.com
mysecuritymadesimple.com
malwaremastery.com
kodaikeiko.com
jrzg996.com
agricurve.net
songlingjiu.com
virginianundahfishingclub.com
friendschance.com
pastelpresents.com
answertitles.com
survival-hunter.com
nxfddl.com
traditionnevertrend.com
agrovessel.com
unicorm.digital
cucumboy.com
alemdogarimpo.com
laraful.com
hexwaa.com
hanu21st.com
knoycia.com
qishengxing.com
gopipurespices.com
fdkkrfidkdslsieofkld.info
elephantspublications.online
valeriebeijing.com
xn--42cg2czax6ptae6a.com
2shengman.com
sfcshavedice.com
ragworkhouse.com
stardomfrokch.xyz
exoticcenterfold.com
eventosartifice.com
test-order-noren.com
110bao.com
face-pro.online
freedomoff.com
futuresep.com
tremblock.com
chocolat-gillotte.com
speclove.com
ddflsl.com
goodnewsmbc.net
cloudtotaal.com
goapps-auth.com
ouch247max.com
sabra-sd.com
luxuryneverhurt.art
rxvendorpills.online
ludowinners.online
placemyorder.online
skyrim.company
monsterlecturer.com
controle-fiscal.com
phoenixinjurylawyer.online
nanoheadgames.com
toposales.com
Targets
-
-
Target
HIRE SOA JAN 2022.exe
-
Size
248KB
-
MD5
f7c0bc31aeb94707cdce8cf6abd4f099
-
SHA1
82725d581ae393a4fc5961f911e338f7a85e9683
-
SHA256
2e3edcdf1ab052a2e0fbd8ffdaf213876b3571b23ff74f5e157ce24a1155be81
-
SHA512
d2b36412ada4f8ddf052e55682b1ce523bc18b0c3203e064f7ec7da58b6433522c392cfd22d9435dc98186d850915938aa508131cb3bbf14c410e5f5c0bf4feb
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-