General
-
Target
COMMANDE2022.exe
-
Size
240KB
-
Sample
220412-raapgscbgq
-
MD5
b416c05593038ca7e314f102e0dcae6e
-
SHA1
20ab9278c05a8f278a2daff13951b6d28086db71
-
SHA256
c0d6833e7ba34a1a05310005fa4e09ad5e1e2b60edf8fe62fc42b7610913496c
-
SHA512
a3425015be98c426f394e06e37bc945ee52e07c023ca8b7fe7d52baa5761c77c1cb1d16f6806330b8f2e3e71056263e70e8bec922b7dd0dad07962d97713b43a
Static task
static1
Behavioral task
behavioral1
Sample
COMMANDE2022.exe
Resource
win7-20220331-en
Malware Config
Extracted
xloader
2.5
cbgo
santesha.com
britneysbeautybar.com
sh-cy17.com
jeffcarveragency.com
3117111.com
sobrehosting.net
ddm123.xyz
toxcompliance.com
auditorydesigns.com
vliftfacial.com
ielhii.com
naameliss.com
ritualchariot.com
solchange.com
quatre-vingts.design
lawnmowermashine.com
braceletsstore.net
admappy.com
tollivercoltd.com
vaidix.com
rodrigomartinsadv.com
bouncingskull.com
hamiltonhellerrealestate.com
dream-kidz.com
growupnotgrowold.com
clanginandbangin.com
cornerstone-constructions.com
mcdonalds-delivery.xyz
omnikro.com
nca-group.com
hughers3.com
move-mobius.com
shrivs.com
hoshikuzu-hegemony.com
zpwx17.online
masoncable.com
butecreditunion.com
creativefolksnetwork.xyz
lejanet.com
tacticalslings.club
bestprodutos.com
quirkysoul39.com
sdettest.com
aomendc.xyz
lorticepttoyof6.xyz
nonvaxrnpositions.com
maintainaviation.com
kubanitka.com
fractalmerch.xyz
elbowguru.com
nikiyang.com
cialisactivesupers.com
bestofrochester.info
ynov-rennes.com
saiden8164.com
ffuster.com
papierle.com
dobsonfryedentist.com
rufisquoisedetransit.com
compassionatecuddling.com
kimlady.com
mashinchand.com
semicivilization.com
milamixecommerce.com
ambassadorandceoclub.com
Targets
-
-
Target
COMMANDE2022.exe
-
Size
240KB
-
MD5
b416c05593038ca7e314f102e0dcae6e
-
SHA1
20ab9278c05a8f278a2daff13951b6d28086db71
-
SHA256
c0d6833e7ba34a1a05310005fa4e09ad5e1e2b60edf8fe62fc42b7610913496c
-
SHA512
a3425015be98c426f394e06e37bc945ee52e07c023ca8b7fe7d52baa5761c77c1cb1d16f6806330b8f2e3e71056263e70e8bec922b7dd0dad07962d97713b43a
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-