General
-
Target
Swift Copy05262020.pdf.exe
-
Size
342KB
-
Sample
220527-nmp36aeeaq
-
MD5
8380afc6e34fe722c9e16f6ee797bab8
-
SHA1
5dd6c2103053372286d09b6fdb374c1d43e23a4f
-
SHA256
1868d031ba42f5f9b2f176f218647509ebcbf1171ed0da75a594a26744d03d9a
-
SHA512
e6097dc8b5a633e0d9d8798ea1366338b7a1d64f822907c4ce5b5f9e6029438c578cb559731cdef87ad54a09f6890d76df73f2f1745248a05e18879cf782c39c
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy05262020.pdf.exe
Resource
win7-20220414-en
Malware Config
Extracted
xloader
2.6
ygkp
cbdlively.com
1nfo-post.com
janejohnsonlmt.com
autotradecryptoswithjack.com
mustang-international.net
dreamthorp.com
alexandratanner.net
exilings.com
gzjdgjg.com
51minzhu.com
wgv.info
raymondjamesconsult.com
omariblair.com
vaalerahealth.com
outdoorvoiceshop.com
spbo.info
blasiandating.online
c01-cdn48-oxble.xyz
mrmycology.com
installturbooax.com
duoxiyuemy.com
creativeartwithcarol.com
jasonatenphotography.net
hhcstarusa.com
91itaogo.com
itubini.com
trypetinsure.com
koushi3737.com
gujiufz.xyz
nereklam.com
greenlandtours.net
furrycutiepet.com
boredmilady.xyz
thepromenadeboutique.com
antoinevigne.com
affinityassurance.ltd
trmstudiotx.com
ganeshpyropark.com
rivaln.net
loupsychiatry.com
ballenasnegras.store
treylonburksjersey.com
cumannstaire.com
vintagemuseumct.com
reich-consulting.com
emmagabriele.com
form4506-t.net
al-muhamdi.com
ggmaprimarycare.com
q0fagmy6x5ctmxn6vykr.com
nqted.com
rebelsoflove.life
birdiecrafts.site
acrostical.info
usarealshop.com
d908.red
vspashkapolya.store
locksmith---pasadena.com
itooktheorangepill.com
findachristianbusiness.com
authorlanijames.com
cryptoreportfraud.com
idolovetheusa.com
moicapitaine.com
southwestcancer.com
Targets
-
-
Target
Swift Copy05262020.pdf.exe
-
Size
342KB
-
MD5
8380afc6e34fe722c9e16f6ee797bab8
-
SHA1
5dd6c2103053372286d09b6fdb374c1d43e23a4f
-
SHA256
1868d031ba42f5f9b2f176f218647509ebcbf1171ed0da75a594a26744d03d9a
-
SHA512
e6097dc8b5a633e0d9d8798ea1366338b7a1d64f822907c4ce5b5f9e6029438c578cb559731cdef87ad54a09f6890d76df73f2f1745248a05e18879cf782c39c
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Xloader Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-