General
-
Target
order request.exe
-
Size
563KB
-
Sample
220203-rf5rtaacck
-
MD5
fae7b5f628a7c1642f1d22bc4dde9369
-
SHA1
cae7c670a8def01cbb693f972174a8489a0ee2bc
-
SHA256
d368e6da00a94aa2a44145cde60d85f8b29cf8634893769f243f503524e24043
-
SHA512
51aa5c7e886419f970259268aec5201c81fad9fbc3780192c60111745ab6807f1fe8940d80abca985c03ce434c92458b38489eaf1a1620f9eacec33153e7af9f
Static task
static1
Behavioral task
behavioral1
Sample
order request.exe
Resource
win7-en-20211208
Malware Config
Extracted
xloader
2.5
s9ne
digital-performance-award.com
fioratti.xyz
designluxre.com
cngangdun.com
restaurantperladelmare.com
davinci65.info
glossmans.com
firstsmileimaging.com
indevmobility.biz
mvptcodesupport.com
crustenc.net
raleighsportsacademy.com
boytoyporn.com
rojaspass.com
acmepaysage.fr
shopatdean.xyz
leonergsteve18870.com
elnahuel.com
ils.network
canto-libero.com
bracknellglazingcommercial.com
jordanontheshirts.com
pnwpickleballclub.com
studibucks.com
stevesbbcards.com
pingerton.online
wincrestadvisors.com
fabiulaezeca.com
internationally.info
alianzaporextremadura.com
annianzu.icu
suryaweb.host
uh6or9.com
burceh5.store
herbalmedication.xyz
taiquandao.net
duongkhanglinh.club
endokc.com
fourjuicydeny.com
shengyuantongfs.com
sport-laboratory.com
redesignpain.com
hedefcapitals33.com
nhealthcareservices.online
exodicuis.com
hottubsswimspascoralsprings.com
louiecruzbeltran.info
sherrilyndale.com
ohneulmum.quest
adopteunper.com
windpeople.store
mypagbound.com
cargopremier.com
amichekadota.quest
efootballpro2022.net
jeeaner.com
clasiquitos.com
rockyal.xyz
vnpmhs.com
cnshuanglai.com
ratawatakara.com
stc-ksa.com
happy-bihada.space
flirty-little-secret.com
woodentoysforkids.store
Targets
-
-
Target
order request.exe
-
Size
563KB
-
MD5
fae7b5f628a7c1642f1d22bc4dde9369
-
SHA1
cae7c670a8def01cbb693f972174a8489a0ee2bc
-
SHA256
d368e6da00a94aa2a44145cde60d85f8b29cf8634893769f243f503524e24043
-
SHA512
51aa5c7e886419f970259268aec5201c81fad9fbc3780192c60111745ab6807f1fe8940d80abca985c03ce434c92458b38489eaf1a1620f9eacec33153e7af9f
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Sets service image path in registry
-
Deletes itself
-
Suspicious use of SetThreadContext
-