General
-
Target
vbc.exedcsuweoc
-
Size
553KB
-
Sample
220626-gw3maahfgj
-
MD5
4add727d1541102e34e167c689892d98
-
SHA1
368ef2217b4146efb0f2154900628c6e374828e8
-
SHA256
6934dc8f453b1832dc1a7579a1b3888a1e7e4a7ab19f30fe975bbed018388ace
-
SHA512
2fdc3db9cd0dad7fa365603060dc5da1b9a5708aa619c7c5b174c3a659d1e1c3bb0a18b124983a5204b84b80d0a80afc67058a6c241cfe45b85b504d0ab55e42
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7-20220414-en
Malware Config
Extracted
xloader
2.5
r87g
gzjyjzsj.com
rapibest.com
affordablebathroomsbyfrank.net
roboruben.com
xn--dlisucr-byag.com
encoreasso.com
piscire.com
dixiebusybee.com
newrome.xyz
sunshinejon.com
glacierforfcs.xyz
borhanmarket.com
tous-des-cons.club
hsfstea.com
spiniform.info
vaicomfibra.com
shinigami.xyz
kryptoindia.com
listentoappetite.com
securepplpay.com
savannabrazell.com
dallascowboysticket.online
lemuria4.online
pakistaninusa.com
realdigitaldivide.com
nameandlikenesslabs.com
icris2021.com
amorporlaropa.com
xgirlstar.com
localhuktoyof6.xyz
about-times.xyz
withvertex.com
newtajmahalfashion.xyz
myapple3.com
sjitcom.com
shemanifesteverything.com
nft2yuan.com
misfitlamps.com
nordicautoparts.net
precisecleanteam.com
unmoro.com
gh-michikusa.com
usbgdt.net
ordt.xyz
hcaptchabypass.com
samedaycash.loan
lavistacaffe.com
alicekay.online
aceproservices.net
androidapdate.com
kredsen.website
southwinds-kolkata.com
069superbetin.com
adorablymeboutique.store
xbet973.com
xn--czrr40i.xn--io0a7i
shadow-marketing.com
license-plate-find.online
wwwoneparkfinancial.com
milehighrenewals.com
scyxmq.com
mbdeyren.com
nottryingdoing.com
homesandhorse.com
stpaulsschoolbagidora.com
Targets
-
-
Target
vbc.exedcsuweoc
-
Size
553KB
-
MD5
4add727d1541102e34e167c689892d98
-
SHA1
368ef2217b4146efb0f2154900628c6e374828e8
-
SHA256
6934dc8f453b1832dc1a7579a1b3888a1e7e4a7ab19f30fe975bbed018388ace
-
SHA512
2fdc3db9cd0dad7fa365603060dc5da1b9a5708aa619c7c5b174c3a659d1e1c3bb0a18b124983a5204b84b80d0a80afc67058a6c241cfe45b85b504d0ab55e42
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-