General
-
Target
Cslmw.exe
-
Size
23KB
-
Sample
220311-3gw2vaffcl
-
MD5
f252b7a35b4b4af6a7dee8840b1e7132
-
SHA1
e9fa1a744adc80c91203aaf06e4edbcd25cac199
-
SHA256
4a5a4b370430e4f8fed7a3e8e7deb08321740497e0e693482352d2db973dbabd
-
SHA512
389e94b834f64609e8b2a861f5697a3b5b7eee4e2f71b76ae19a616560bd1f8d1d3396cf13e657c41792e43caedd61fe6641983819bbf83f8625fbd693c65af5
Static task
static1
Behavioral task
behavioral1
Sample
Cslmw.exe
Resource
win7-20220311-en
Malware Config
Extracted
xloader
2.5
ssac
beautybybrin.com
oregemo.com
prospectoriq.com
blazermid.com
cloudnineloans.com
myyntisofta.com
filoupoils.com
web-solutiontnpasumo3.xyz
becbares.com
lines-hikkoshi.com
ohayouwww.com
writingdadsobituarywithdad.com
bridalbaes.com
jamshir.com
rangertots.com
dankbrobeans.com
titan111.com
uplearns.info
maxicashprokil.xyz
evc24.com
mingshan888.com
thehomefurnishings.com
jjyive.space
vtkk.info
state-attorney.online
zoho.systems
nd300.com
ivermectinforanimals.ca
gruppobenedetto.com
planet99angka.xyz
astrotiq.com
fangshensj.com
ocean.limited
zalaridumpf.quest
cursolibreonline.com
lifein.art
identspactures.com
nfltvgo.com
chronicfit.store
mariajosereina.com
hebbz764776341.com
anpxlmmspix.mobi
mydevhub.tech
nobelrealm.com
dentalteamny.com
patinerd.com
socratisbey.xyz
hnylcwfs.com
yujieqin.com
midorato.com
sunglowdragon.com
americaplr.com
cxqdscape.com
situsgacor.xyz
sattlerei-dortmund.com
life120lospaccio.com
riddleme.one
perpustakaan-geominerba.online
renatafaceandbodyskincare.com
allkoreas.com
myvisitiq.com
candlesallday.com
poleador.com
4hsp116.com
homesbyvw.com
Targets
-
-
Target
Cslmw.exe
-
Size
23KB
-
MD5
f252b7a35b4b4af6a7dee8840b1e7132
-
SHA1
e9fa1a744adc80c91203aaf06e4edbcd25cac199
-
SHA256
4a5a4b370430e4f8fed7a3e8e7deb08321740497e0e693482352d2db973dbabd
-
SHA512
389e94b834f64609e8b2a861f5697a3b5b7eee4e2f71b76ae19a616560bd1f8d1d3396cf13e657c41792e43caedd61fe6641983819bbf83f8625fbd693c65af5
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Xloader Payload
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-