General
-
Target
PAYMENT SWIFT.exe
-
Size
945KB
-
Sample
220622-f6l7lsbce7
-
MD5
58a2b57d6fed01004f9a3836daf788aa
-
SHA1
c3f3d392937fc4b9603a802808c72276a2070484
-
SHA256
dd343e8e8564f63c03e29e51e23e4181817e37f8203f4ec5a8abb9f6ca21a7bf
-
SHA512
0cdb854bff03250a52126e987112a53a44d55c5b8d3b7e79f2a01001edeb7b89375082b1891faded95e507b48f7130665a50842e535c6c6b4ecb8970ccf7fef0
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT SWIFT.exe
Resource
win7-20220414-en
Malware Config
Extracted
xloader
2.6
be3s
aoxaswa.info
souplab-graphic.com
churchontheisland.com
spclassic-cars.com
stanford-edu.club
heydowm.online
chattanooga-electricians.com
sectsk.com
cxg98.com
buildafricaonline.net
buydogcoin.com
vsst247.com
lodgelastrancas.com
ainonaho.com
griousndwarehsftyfs.xyz
voltagestabilizersupply.com
xn--79q565dzfex9hg81b.com
isrvr-ccrforum.info
chitiandi.com
criticaldisco.com
fxivcama.com
martinsalas12.com
stellar3.xyz
positivistapproach.com
drivecheckeredflagcdjr.com
ejxsj.com
vegastrader.net
srivedafireandsafetysystems.com
ssmrmt.com
alexander-stuart.com
bill-tj.com
ctgteams.com
gossipnode.com
c431s.com
kelleysheartinart.com
rusucatalin.com
beautifulcreativeconcepts.info
hongyanwulei.com
lhab.xyz
gpzdd.com
dailyprizes-2022.site
hollafashions.com
gecharity.com
villagegram.com
davisesinthesmokies.xyz
webandsundry.com
setthetonenyc.com
bayu122.com
lajollabella.com
ghazalceramic.com
soft-iwacu.online
haksography.com
karise.life
promobilelist.com
respecttheroyalty.com
17500teraholland.com
giraffeemarketing.com
canyouseelouise.net
watchur6.com
eqaq-tvzurp.xyz
onlinecumpar.com
watchdiving.com
austriatourguide.com
kavun2.xyz
mpmidea.com
Targets
-
-
Target
PAYMENT SWIFT.exe
-
Size
945KB
-
MD5
58a2b57d6fed01004f9a3836daf788aa
-
SHA1
c3f3d392937fc4b9603a802808c72276a2070484
-
SHA256
dd343e8e8564f63c03e29e51e23e4181817e37f8203f4ec5a8abb9f6ca21a7bf
-
SHA512
0cdb854bff03250a52126e987112a53a44d55c5b8d3b7e79f2a01001edeb7b89375082b1891faded95e507b48f7130665a50842e535c6c6b4ecb8970ccf7fef0
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Xloader Payload
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-