General
-
Target
yxrp7aBc7KHBCsk.exe
-
Size
1.1MB
-
Sample
221004-ke3gqsafbm
-
MD5
48ab3af9d46affb38d6bba63215f606f
-
SHA1
5a5f9ddc5cf46787a03c8cefe1c038274b69f2eb
-
SHA256
0b064f0ef5c1fc97add6a750c3166edc03d6ebbcf0ed5b0e36cec598ff2e301e
-
SHA512
7eea0bfbd69f74003a5a24c6ae9cfcb13321454e932bee8026a6ef636e5ad9750aff3b081b6f3bd031578c600df9e3e2a6f0122551540aa23f5ec174bae33647
-
SSDEEP
24576:0ufO+8zjZ1dSvam6fNgyDh1u7hDi7hdqkMzjVfr:nz8zjZbSz6Vy7UT5OJfr
Static task
static1
Behavioral task
behavioral1
Sample
yxrp7aBc7KHBCsk.exe
Resource
win7-20220812-en
Malware Config
Extracted
formbook
cqd8
9zPItsSBQPthH0B1
iyz2ugC7TUMEaZEDDTNIzw==
uVc25zCFO03zbYzHxXLElk5HHccFoes=
RYDZw1su7yszucXjwqtgrz1tSccFoes=
AiB+KfBdDLRFs8sOAsmAllKZeg==
w5T7/Y1lNGBeMdKkKNl8tUl3fTWjlURG
mcIHqPCaEavSyg==
YA7dyN6xKf1MKJa/RA==
Dt789IRVd/fO8FeQNOiV3g==
jYfu3dS4b/1OL59exnPPEo4=
SjyOSKD6lRhpWwUmMwE8ncB1KOg=
JIT782/TaO41DXw3hYJa1g==
uT4u7SwA+3yA/iCo0O7tHyeffA==
/gJzPfngDySzwndmyHPPEo4=
+Um8wD7b9bCQ8A9cK4Nl1oA=
RaikVqx5ozxW3vd6khgIHsDMgKrv
hyYEyRMIEJ8WdnFePeLgHyeffA==
bCov6raFJ30odm5fJQQ=
1rMMrXrTf7OZqyLVM708wZ0=
U4nspOC6sJ3et2I=
Amsy4i4MxPTrXYWeojyK
qqYLwgp2O/CAx73ntWL3DLmD
v+o9+ruZZv5gEuvofQ4=
Q2TEpDYKHJSOCCGbqS91tm+gZCM193JQ
myoIxQ/iiohHn17RlzWI
rzQd05nrgI907Re4QPfYHyeffA==
QkC8sCmTTfZrZLz5hAw=
t5r3o/G/cZ+vdu+g+oMEE8B1KOg=
C0u8wFktz793xKe4jnATIMyJ
TjKaV5ZbDyQHOJcUcFCC
djpCCcmZXwlBpMPyIUZf3A==
Un779oxhdgtHI8SnDdcOIJc=
YKgTvQjejYw4pbqeojyK
KBd0a2BKX1jU15Ctom33DLmD
aZ7/sQblqNS+Nla7AauEB8sNyUDm9Cki3A==
zJhnWWws5JL973c6hYJa1g==
gb0n1xj1K9MC+ad0z3Q9RRUT7+A=
0sQMsgbWCJyyZFPrSA==
20IjpORM6MDYxQ==
N2y7vVIlDbMG+AQ9Xw==
agEIEhBjAg3OQ16NYNzfakfMbRKp7w==
wDsU0Rr/6MDYxQ==
NTeghQ12G3s0MZTduZkswZ8=
L97Zk19BYXUZfWlr/Hbj7Vt5T8cFoes=
YHzblVUr2IQblbeeojyK
NWrc623LYOxVqMvtvtcOIJc=
Dop0ZWnNM31cvnASfhs=
cKw08CYD6MDYxQ==
lz8u3baYpK4zHYw3hw6iJc3MgKrv
0Z9yXF01VUO1A/rtvHT3DLmD
7IxuWmMwLzEGXXr7TPzbHyeffA==
S+IyyYGNQ+w=
OWLEsDwEJcYYEcOg8Jv2NZ0=
hpoR35NpipozlYN/D8SS7rT7bRKp7w==
mZgB83regxFgYgTmbOhb3LW2m5Sa02tO
P4jc4mGzUuhRSebNpG73DLmD
rjMAwp8+nZxq
t9Ab0ZFjaHgssun2RiGA
CEKgRx1lGCe1DvvzfjFHWAGQNu4=
295oZvzAc4xt4wVshYJa1g==
+f5vXOqxxTQWorueojyK
CMKeTBzmgQ+IlQgskhU=
2lhYTVMvVGIRj7GeojyK
BCq+UU4+nZxq
tornoallavita.com
Extracted
xloader
3.8
cqd8
9zPItsSBQPthH0B1
iyz2ugC7TUMEaZEDDTNIzw==
uVc25zCFO03zbYzHxXLElk5HHccFoes=
RYDZw1su7yszucXjwqtgrz1tSccFoes=
AiB+KfBdDLRFs8sOAsmAllKZeg==
w5T7/Y1lNGBeMdKkKNl8tUl3fTWjlURG
mcIHqPCaEavSyg==
YA7dyN6xKf1MKJa/RA==
Dt789IRVd/fO8FeQNOiV3g==
jYfu3dS4b/1OL59exnPPEo4=
SjyOSKD6lRhpWwUmMwE8ncB1KOg=
JIT782/TaO41DXw3hYJa1g==
uT4u7SwA+3yA/iCo0O7tHyeffA==
/gJzPfngDySzwndmyHPPEo4=
+Um8wD7b9bCQ8A9cK4Nl1oA=
RaikVqx5ozxW3vd6khgIHsDMgKrv
hyYEyRMIEJ8WdnFePeLgHyeffA==
bCov6raFJ30odm5fJQQ=
1rMMrXrTf7OZqyLVM708wZ0=
U4nspOC6sJ3et2I=
Amsy4i4MxPTrXYWeojyK
qqYLwgp2O/CAx73ntWL3DLmD
v+o9+ruZZv5gEuvofQ4=
Q2TEpDYKHJSOCCGbqS91tm+gZCM193JQ
myoIxQ/iiohHn17RlzWI
rzQd05nrgI907Re4QPfYHyeffA==
QkC8sCmTTfZrZLz5hAw=
t5r3o/G/cZ+vdu+g+oMEE8B1KOg=
C0u8wFktz793xKe4jnATIMyJ
TjKaV5ZbDyQHOJcUcFCC
djpCCcmZXwlBpMPyIUZf3A==
Un779oxhdgtHI8SnDdcOIJc=
YKgTvQjejYw4pbqeojyK
KBd0a2BKX1jU15Ctom33DLmD
aZ7/sQblqNS+Nla7AauEB8sNyUDm9Cki3A==
zJhnWWws5JL973c6hYJa1g==
gb0n1xj1K9MC+ad0z3Q9RRUT7+A=
0sQMsgbWCJyyZFPrSA==
20IjpORM6MDYxQ==
N2y7vVIlDbMG+AQ9Xw==
agEIEhBjAg3OQ16NYNzfakfMbRKp7w==
wDsU0Rr/6MDYxQ==
NTeghQ12G3s0MZTduZkswZ8=
L97Zk19BYXUZfWlr/Hbj7Vt5T8cFoes=
YHzblVUr2IQblbeeojyK
NWrc623LYOxVqMvtvtcOIJc=
Dop0ZWnNM31cvnASfhs=
cKw08CYD6MDYxQ==
lz8u3baYpK4zHYw3hw6iJc3MgKrv
0Z9yXF01VUO1A/rtvHT3DLmD
7IxuWmMwLzEGXXr7TPzbHyeffA==
S+IyyYGNQ+w=
OWLEsDwEJcYYEcOg8Jv2NZ0=
hpoR35NpipozlYN/D8SS7rT7bRKp7w==
mZgB83regxFgYgTmbOhb3LW2m5Sa02tO
P4jc4mGzUuhRSebNpG73DLmD
rjMAwp8+nZxq
t9Ab0ZFjaHgssun2RiGA
CEKgRx1lGCe1DvvzfjFHWAGQNu4=
295oZvzAc4xt4wVshYJa1g==
+f5vXOqxxTQWorueojyK
CMKeTBzmgQ+IlQgskhU=
2lhYTVMvVGIRj7GeojyK
BCq+UU4+nZxq
tornoallavita.com
Targets
-
-
Target
yxrp7aBc7KHBCsk.exe
-
Size
1.1MB
-
MD5
48ab3af9d46affb38d6bba63215f606f
-
SHA1
5a5f9ddc5cf46787a03c8cefe1c038274b69f2eb
-
SHA256
0b064f0ef5c1fc97add6a750c3166edc03d6ebbcf0ed5b0e36cec598ff2e301e
-
SHA512
7eea0bfbd69f74003a5a24c6ae9cfcb13321454e932bee8026a6ef636e5ad9750aff3b081b6f3bd031578c600df9e3e2a6f0122551540aa23f5ec174bae33647
-
SSDEEP
24576:0ufO+8zjZ1dSvam6fNgyDh1u7hDi7hdqkMzjVfr:nz8zjZbSz6Vy7UT5OJfr
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-