General
-
Target
tmp
-
Size
446KB
-
Sample
220420-ntfhasfcfj
-
MD5
71895780eaa4fe577e5d406cb84e150e
-
SHA1
e798fb18a9ddf2510cdbc536dd96144661ca8ea8
-
SHA256
c43a9d3d87d5ce17e61de74587b9a1e4aa0250aae1fa6dde4e392e6de187b096
-
SHA512
d78eeff6df29a1f3a6e2366746fbbf1fa58595ed3ddbf491d9e5bdb34aa060306b219c916ff4e39bb3c35a6a9f4700753515067d531bcc774f5303fa6b1ed3fd
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Malware Config
Extracted
xloader
2.5
a2c8
sethdukes.online
hustl-hk.com
alienspacebabes.com
yitongbag.com
adlichoob.com
wejust5.com
wwwsnapfinancial.com
patriotcapitalgroupllc.com
divaconnectionbuild.com
adventureventures.net
jaromer.net
closureservices.com
sdc-english.com
fleet-lab.com
gtgits.com
clinicaorion.com
deleaderainfluenceur.com
honghuamach.net
638661.com
sleepgenies.info
strtplay2day.info
ellsworthfunds.com
workthered.com
handsomered.com
6953.online
discover4two.com
yshengxiang.com
thenicnackgyrls.com
deathtohope.com
lhdtrj.com
primedispatchers.com
rojosusa.com
ekini.online
hdlypx.com
trendsplayers.xyz
inclusichecks.com
idm-convention.com
efp-advisors.com
kansaslivestockfoundation.com
2020taxpros.com
chesexamprep.com
fking.biz
vmhenterprise.com
cherrythechickenandfriends.com
unheek.com
somnoengineering.com
aaraeg.net
jbzisha.com
healthoffword.xyz
redis76.com
gigtex.com
schoolaccred.net
vadiemfg.com
tbrme.plus
icdmeister.com
sunshinecoastfashion.com
babypasal.com
kaizenswinger.com
apfllcadvisors.com
cheffumeur.com
luzider-traum.net
functionalsoft.com
toityzvolat.quest
awla-bus.com
westexeurope.com
Targets
-
-
Target
tmp
-
Size
446KB
-
MD5
71895780eaa4fe577e5d406cb84e150e
-
SHA1
e798fb18a9ddf2510cdbc536dd96144661ca8ea8
-
SHA256
c43a9d3d87d5ce17e61de74587b9a1e4aa0250aae1fa6dde4e392e6de187b096
-
SHA512
d78eeff6df29a1f3a6e2366746fbbf1fa58595ed3ddbf491d9e5bdb34aa060306b219c916ff4e39bb3c35a6a9f4700753515067d531bcc774f5303fa6b1ed3fd
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-