General
-
Target
Halkbank_Ekstre_20220128_081138_756957 (1).exe
-
Size
17KB
-
Sample
220128-zr7pjsdge9
-
MD5
749aaf49615aa07edc9755541b213a4a
-
SHA1
8e856cae4e8d14c7d37f5d8342fc2d30acfede64
-
SHA256
d47bd2ff5d90d64d18485203e59a952e485a39f98e3d54258a578b13d9136ae7
-
SHA512
a3b731a35b418ab43efc8d09e2373bb659dc78fa8408fa6edc6da66d13e03f13228b6db22eab4a47be96a99c162c09d01565182e3684e61a0fa017e9c7b4f7b7
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank_Ekstre_20220128_081138_756957 (1).exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Halkbank_Ekstre_20220128_081138_756957 (1).exe
Resource
win10-en-20211208
Malware Config
Extracted
xloader
2.5
po6r
jnhuichuangxin.com
mubashir.art
extol.design
doyyindh.xyz
milanoautoexperts.com
4thefringe.com
453511.com
sellathonautocredit.com
velgian.com
6672pk.com
wodeluzhou.com
sumiyoshiku-hizaita.xyz
imoveldeprimeira.com
dgjssp.com
endokc.com
side-clicks.com
cashndashfinancial.com
vanhemelryck.info
agamitrading.com
woofgang.xyz
atnetworkinc.com
malleshtekumatla.com
com-home.xyz
buildyourmtg.com
viairazur.xyz
drproteaches.com
amaznsavings.com
karencharlestonrealtor.com
bootstrategy.com
mimtgexpert.com
sebzvault.com
brtaclub.com
gicarellc.com
annehonorato.com
rafalgar.com
bergenyouthorchestra.com
entrevistasesenciales.com
thekneedoctors.com
grosseilemireal.estate
celestialdrone.art
bouwdrogerhurenvlaanderen.com
koppakart.com
irishykater.quest
blinglj.com
editorparmindersingh.com
klnhanced.quest
divinebehaviorsolutions.com
amprope.com
futuracart.com
ditrhub.com
eaoeducationprogramme.com
smartplumbing.services
revelandlaceevents.com
bikedh.xyz
pacificdevelopmentstudio.com
palisadesskivacation.com
happy-pets.xyz
killyourselfnigger.com
sonicdrillinginstitute.com
alibabascientific.com
sh-leming.com
aseelrealestate.com
lohmueller.gmbh
ngoccompany.com
healthonline.store
Targets
-
-
Target
Halkbank_Ekstre_20220128_081138_756957 (1).exe
-
Size
17KB
-
MD5
749aaf49615aa07edc9755541b213a4a
-
SHA1
8e856cae4e8d14c7d37f5d8342fc2d30acfede64
-
SHA256
d47bd2ff5d90d64d18485203e59a952e485a39f98e3d54258a578b13d9136ae7
-
SHA512
a3b731a35b418ab43efc8d09e2373bb659dc78fa8408fa6edc6da66d13e03f13228b6db22eab4a47be96a99c162c09d01565182e3684e61a0fa017e9c7b4f7b7
Score10/10-
Modifies WinLogon for persistence
-
Xloader Payload
-
Suspicious use of SetThreadContext
-