General
-
Target
sample catalog 2022.exe
-
Size
379KB
-
Sample
220708-p2xxzscfbr
-
MD5
7b5078b51f6d1f9daec3e4113bdc4f17
-
SHA1
45330b3ae78f978305cd29a4c546ef561390e4e1
-
SHA256
be5b336a3ad03b3b70a286e38ba35c631f7d98f3c54e996c2e787f225b449879
-
SHA512
b6003603b3676fe36ae809c873a1a766f52eb6cfab88ddc151ef8d2b64139e34e13c0b1d4f2b90181f71d6b4f2151dfc523000d0585aa9433d8581d6e27cf582
Static task
static1
Behavioral task
behavioral1
Sample
sample catalog 2022.exe
Resource
win7-20220414-en
Malware Config
Extracted
xloader
2.6
vweq
malang-media.com
mrsfence.com
lubetops.com
aitimedia.net
montecryptocapital.com
ahwmedia.com
bvmnc.site
bggearstore.com
bcsantacoloma.online
alltimephotography.com
santacruz-roofings.com
leaplifestyleenterprises.com
censovet.com
similkameenfarms.com
undisclosed.email
thetrinityco.com
rapiturs.com
jedlersdorf.info
mh7jk12e.xyz
flygurlblogwordpress.com
goodbaddesign.com
equipmentrentalpartyplus.com
ohyoutube.com
projetoarvore.com
2379.flights
implemedescribed.com
kreasinesia.com
ownitoffice.com
fortekofteacizyemeknerde.store
my-wh-webproject.com
518499.com
naples-us.com
tlrohio.com
kanchava.com
lcloudfindin.com
cybermatrix.tech
i6lqi.xyz
ebay-online-selling-24.com
afrisectelecoms.com
tiantian997.xyz
strategyvenues.com
marketnear.watch
thebrooklynyogi.com
sonikbuilder.online
voyagesconsulting.com
ledgel0ungers.com
youhadtobethere.biz
disabled-long.com
dental-implants-encounter.life
zydssq.com
livingwell.green
doumao334.xyz
moodysoot.online
licos.xyz
maqitashop.com
doroos.online
laikemiao.com
petrolverse.xyz
apostolicpraise.net
todaychance.com
helightville.com
st-john-fisher-school.com
agwly.com
dashop.pro
zxc3426.xyz
Targets
-
-
Target
sample catalog 2022.exe
-
Size
379KB
-
MD5
7b5078b51f6d1f9daec3e4113bdc4f17
-
SHA1
45330b3ae78f978305cd29a4c546ef561390e4e1
-
SHA256
be5b336a3ad03b3b70a286e38ba35c631f7d98f3c54e996c2e787f225b449879
-
SHA512
b6003603b3676fe36ae809c873a1a766f52eb6cfab88ddc151ef8d2b64139e34e13c0b1d4f2b90181f71d6b4f2151dfc523000d0585aa9433d8581d6e27cf582
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader payload
-
Suspicious use of SetThreadContext
-