General
-
Target
RFQ#220128.exe
-
Size
749KB
-
Sample
220128-g92xxagefl
-
MD5
6d236070946d1a500d0ce9988240975f
-
SHA1
94ada5c3577d58390b252353f3ec9a7fcca49c35
-
SHA256
beccec456cf3e74a220ae1c8fa65cc0f4ddef57bee5d4f2ec71ad7b99da52369
-
SHA512
362e149560e26131d6d00daf1ba7a8bf6f156990bbbb90d8eb3d1a2249277288d109d388046d5cfbc816cd05aaec02d8729d636b340c4ff7f934543b62ba27db
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#220128.exe
Resource
win7-en-20211208
Malware Config
Extracted
xloader
2.5
s9ne
digital-performance-award.com
fioratti.xyz
designluxre.com
cngangdun.com
restaurantperladelmare.com
davinci65.info
glossmans.com
firstsmileimaging.com
indevmobility.biz
mvptcodesupport.com
crustenc.net
raleighsportsacademy.com
boytoyporn.com
rojaspass.com
acmepaysage.fr
shopatdean.xyz
leonergsteve18870.com
elnahuel.com
ils.network
canto-libero.com
bracknellglazingcommercial.com
jordanontheshirts.com
pnwpickleballclub.com
studibucks.com
stevesbbcards.com
pingerton.online
wincrestadvisors.com
fabiulaezeca.com
internationally.info
alianzaporextremadura.com
annianzu.icu
suryaweb.host
uh6or9.com
burceh5.store
herbalmedication.xyz
taiquandao.net
duongkhanglinh.club
endokc.com
fourjuicydeny.com
shengyuantongfs.com
sport-laboratory.com
redesignpain.com
hedefcapitals33.com
nhealthcareservices.online
exodicuis.com
hottubsswimspascoralsprings.com
louiecruzbeltran.info
sherrilyndale.com
ohneulmum.quest
adopteunper.com
windpeople.store
mypagbound.com
cargopremier.com
amichekadota.quest
efootballpro2022.net
jeeaner.com
clasiquitos.com
rockyal.xyz
vnpmhs.com
cnshuanglai.com
ratawatakara.com
stc-ksa.com
happy-bihada.space
flirty-little-secret.com
woodentoysforkids.store
Targets
-
-
Target
RFQ#220128.exe
-
Size
749KB
-
MD5
6d236070946d1a500d0ce9988240975f
-
SHA1
94ada5c3577d58390b252353f3ec9a7fcca49c35
-
SHA256
beccec456cf3e74a220ae1c8fa65cc0f4ddef57bee5d4f2ec71ad7b99da52369
-
SHA512
362e149560e26131d6d00daf1ba7a8bf6f156990bbbb90d8eb3d1a2249277288d109d388046d5cfbc816cd05aaec02d8729d636b340c4ff7f934543b62ba27db
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-