General
-
Target
SecuriteInfo.com.IL.Trojan.MSILZilla.16.6444.25180
-
Size
684KB
-
Sample
220711-faxngaeebl
-
MD5
03c62926dbf4f034e94bd73a934560a0
-
SHA1
393a1a67fc66c2b4dc7451f1a6471fa39e261709
-
SHA256
e46f1f06c3ef729e3e1eb6710fe690b35aaf35eca3682f036a78a0fd7c01ec22
-
SHA512
684c4f35777f9d7671e6943fd97018ffd952a17e0a842e6fb2759cc0dfccbd0ab138ef6626d335a57bbf1d2fb5c462e7d2cb772fb3daa31f2a47a60602ba0365
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.IL.Trojan.MSILZilla.16.6444.exe
Resource
win7-20220414-en
Malware Config
Extracted
xloader
2.6
pdrq
welchsunstar.com
mppservicesllc.com
wiresofteflon.com
brabov.xyz
compnonoch.site
yourbuilderworks.com
iamsamirahman.com
eriqoes.com
eastudio.design
skyearth-est.com
teethfitness.com
razaancreates.com
shfbfs.com
joyfulbrokekids.com
kjbolden.com
howirep.com
deedeesmainecoons.website
e-powair.com
aheatea.com
shalfey0009.xyz
designcolor.style
netflixpaymentpending.ca
bothoitrang3.site
motondiarts.com
staynmocean.com
miamivideoshows.com
berendsit.com
yndzjs.com
yiwenhome.xyz
royaldeals.net
clearvison-ts.com
peluqueriasusanagalan.com
thelittlewellnessstudio.com
gurulotaska.com
smgsj.com
followpanelbd.com
prinirwedding.com
3559.fyi
amcvips.com
bigroof.top
chipbio-zt.com
candelasluxuryretreat.com
jboycephotography.com
affiliateindex.xyz
grannysseasonings.com
lcl-inc-test.com
beadallcreations.jewelry
yzzhome.top
tobe-science.com
cincinnaticustomrenovation.com
survaicommercial.xyz
businessdirectorymania.com
phqworld.com
miamigocars.com
labfour.systems
gregoryzeitler.com
dj-mary.com
one1-day.com
vegfiber.com
sfbayraw.net
xn--bndarsloto-s4a.com
felipesb.com
108580.com
1swj06mjrowgi.xyz
koalaglen.com
Targets
-
-
Target
SecuriteInfo.com.IL.Trojan.MSILZilla.16.6444.25180
-
Size
684KB
-
MD5
03c62926dbf4f034e94bd73a934560a0
-
SHA1
393a1a67fc66c2b4dc7451f1a6471fa39e261709
-
SHA256
e46f1f06c3ef729e3e1eb6710fe690b35aaf35eca3682f036a78a0fd7c01ec22
-
SHA512
684c4f35777f9d7671e6943fd97018ffd952a17e0a842e6fb2759cc0dfccbd0ab138ef6626d335a57bbf1d2fb5c462e7d2cb772fb3daa31f2a47a60602ba0365
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Adds policy Run key to start application
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-