General
-
Target
order request 2.7.22.exe
-
Size
776KB
-
Sample
220209-mc56ysabcr
-
MD5
36a68da59f08a4133dc6204676855f60
-
SHA1
626fb150dba5ac72254efd16e02c7b0ecb57a376
-
SHA256
a7264014555068294029d5d9ceb9ee717c4d2bf523330c30cee18f18e55a0b5b
-
SHA512
d3a8cee0111ce9ab4d8255720b019d38535f733c8cb39496cd1cec0bc6b7f3ec8e5736063da713ce188fa7a563d7387e4accbdf1b0b478b82582aa8bed9ccdc0
Static task
static1
Behavioral task
behavioral1
Sample
order request 2.7.22.exe
Resource
win7-en-20211208
Malware Config
Extracted
xloader
2.5
s9ne
digital-performance-award.com
fioratti.xyz
designluxre.com
cngangdun.com
restaurantperladelmare.com
davinci65.info
glossmans.com
firstsmileimaging.com
indevmobility.biz
mvptcodesupport.com
crustenc.net
raleighsportsacademy.com
boytoyporn.com
rojaspass.com
acmepaysage.fr
shopatdean.xyz
leonergsteve18870.com
elnahuel.com
ils.network
canto-libero.com
bracknellglazingcommercial.com
jordanontheshirts.com
pnwpickleballclub.com
studibucks.com
stevesbbcards.com
pingerton.online
wincrestadvisors.com
fabiulaezeca.com
internationally.info
alianzaporextremadura.com
annianzu.icu
suryaweb.host
uh6or9.com
burceh5.store
herbalmedication.xyz
taiquandao.net
duongkhanglinh.club
endokc.com
fourjuicydeny.com
shengyuantongfs.com
sport-laboratory.com
redesignpain.com
hedefcapitals33.com
nhealthcareservices.online
exodicuis.com
hottubsswimspascoralsprings.com
louiecruzbeltran.info
sherrilyndale.com
ohneulmum.quest
adopteunper.com
windpeople.store
mypagbound.com
cargopremier.com
amichekadota.quest
efootballpro2022.net
jeeaner.com
clasiquitos.com
rockyal.xyz
vnpmhs.com
cnshuanglai.com
ratawatakara.com
stc-ksa.com
happy-bihada.space
flirty-little-secret.com
woodentoysforkids.store
Targets
-
-
Target
order request 2.7.22.exe
-
Size
776KB
-
MD5
36a68da59f08a4133dc6204676855f60
-
SHA1
626fb150dba5ac72254efd16e02c7b0ecb57a376
-
SHA256
a7264014555068294029d5d9ceb9ee717c4d2bf523330c30cee18f18e55a0b5b
-
SHA512
d3a8cee0111ce9ab4d8255720b019d38535f733c8cb39496cd1cec0bc6b7f3ec8e5736063da713ce188fa7a563d7387e4accbdf1b0b478b82582aa8bed9ccdc0
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-