General
-
Target
PAYMENT COPY.exe
-
Size
674KB
-
Sample
220623-sp6adagdg8
-
MD5
86954c9c2e07e20ad769ddc718cf4664
-
SHA1
d2662c8786734ab68c18a5c51995e2a4d6619a6e
-
SHA256
e7cd53e425aaa484ba9ee437346ab9e94f7bf5e944621d9644fae69f2ea33f38
-
SHA512
13eec77c6a0e4c5d2a81ff3c69517793f9f7583bdc8add1b2e2a1b333ea277d8db749b6df9c53bd191139cdf819b85270ba0da2d78f76bb4a76c5538746668d4
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT COPY.exe
Resource
win7-20220414-en
Malware Config
Extracted
xloader
2.6
be3s
aoxaswa.info
souplab-graphic.com
churchontheisland.com
spclassic-cars.com
stanford-edu.club
heydowm.online
chattanooga-electricians.com
sectsk.com
cxg98.com
buildafricaonline.net
buydogcoin.com
vsst247.com
lodgelastrancas.com
ainonaho.com
griousndwarehsftyfs.xyz
voltagestabilizersupply.com
xn--79q565dzfex9hg81b.com
isrvr-ccrforum.info
chitiandi.com
criticaldisco.com
fxivcama.com
martinsalas12.com
stellar3.xyz
positivistapproach.com
drivecheckeredflagcdjr.com
ejxsj.com
vegastrader.net
srivedafireandsafetysystems.com
ssmrmt.com
alexander-stuart.com
bill-tj.com
ctgteams.com
gossipnode.com
c431s.com
kelleysheartinart.com
rusucatalin.com
beautifulcreativeconcepts.info
hongyanwulei.com
lhab.xyz
gpzdd.com
dailyprizes-2022.site
hollafashions.com
gecharity.com
villagegram.com
davisesinthesmokies.xyz
webandsundry.com
setthetonenyc.com
bayu122.com
lajollabella.com
ghazalceramic.com
soft-iwacu.online
haksography.com
karise.life
promobilelist.com
respecttheroyalty.com
17500teraholland.com
giraffeemarketing.com
canyouseelouise.net
watchur6.com
eqaq-tvzurp.xyz
onlinecumpar.com
watchdiving.com
austriatourguide.com
kavun2.xyz
mpmidea.com
Targets
-
-
Target
PAYMENT COPY.exe
-
Size
674KB
-
MD5
86954c9c2e07e20ad769ddc718cf4664
-
SHA1
d2662c8786734ab68c18a5c51995e2a4d6619a6e
-
SHA256
e7cd53e425aaa484ba9ee437346ab9e94f7bf5e944621d9644fae69f2ea33f38
-
SHA512
13eec77c6a0e4c5d2a81ff3c69517793f9f7583bdc8add1b2e2a1b333ea277d8db749b6df9c53bd191139cdf819b85270ba0da2d78f76bb4a76c5538746668d4
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Xloader Payload
-
Executes dropped EXE
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-