General
-
Target
c67597e0749c2f4ec2dc0ff4d13940f99e7b978d4785196b17641a7030ffb7b8
-
Size
547KB
-
Sample
221202-vxt87acd8v
-
MD5
143a16680428980e7d1e5ba61a9872d5
-
SHA1
0e9d8b55e264c41337386a4981359018ced2c30e
-
SHA256
c67597e0749c2f4ec2dc0ff4d13940f99e7b978d4785196b17641a7030ffb7b8
-
SHA512
e41327ea92c751e3badd1085aa94a72f6219c0d9ec2e51b67920198a7f1ef335de10f626e551788d05a7c3bef026b02a15e3c5e19541bb324f64bf7c0faf9ac5
-
SSDEEP
12288:A6HvRqssEFpQ4BWAXcaocOyofE8cm+hWA8KQz4/c3CLdew79e+nG8O/k:AuVsSBNXBowofE8c3hzy4U3CLf79VnG8
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Invoice.exe
Resource
win7-20220901-en
Malware Config
Extracted
xloader
2.6
pdrq
welchsunstar.com
mppservicesllc.com
wiresofteflon.com
brabov.xyz
compnonoch.site
yourbuilderworks.com
iamsamirahman.com
eriqoes.com
eastudio.design
skyearth-est.com
teethfitness.com
razaancreates.com
shfbfs.com
joyfulbrokekids.com
kjbolden.com
howirep.com
deedeesmainecoons.website
e-powair.com
aheatea.com
shalfey0009.xyz
designcolor.style
netflixpaymentpending.ca
bothoitrang3.site
motondiarts.com
staynmocean.com
miamivideoshows.com
berendsit.com
yndzjs.com
yiwenhome.xyz
royaldeals.net
clearvison-ts.com
peluqueriasusanagalan.com
thelittlewellnessstudio.com
gurulotaska.com
smgsj.com
followpanelbd.com
prinirwedding.com
3559.fyi
amcvips.com
bigroof.top
chipbio-zt.com
candelasluxuryretreat.com
jboycephotography.com
affiliateindex.xyz
grannysseasonings.com
lcl-inc-test.com
beadallcreations.jewelry
yzzhome.top
tobe-science.com
cincinnaticustomrenovation.com
survaicommercial.xyz
businessdirectorymania.com
phqworld.com
miamigocars.com
labfour.systems
gregoryzeitler.com
dj-mary.com
one1-day.com
vegfiber.com
sfbayraw.net
xn--bndarsloto-s4a.com
felipesb.com
108580.com
1swj06mjrowgi.xyz
koalaglen.com
Targets
-
-
Target
Shipping Invoice.exe
-
Size
614KB
-
MD5
8539c73936ba04868f0f5fa9efafdcae
-
SHA1
4734e4d1cb3692b703f7b90c4b5ea9fb1d665418
-
SHA256
ad13e56d4fc048a43950cc9526b9eebcb35446a710ea6a9ef240199971412a8c
-
SHA512
e6692adec2db4e1eb5b396e41d461857d9658da5fba187a7483924640e38d510425aed40467bc4e512ed34e27374d2b39f2e30999cba026994a1181a5bc5ed60
-
SSDEEP
12288:p9UI9qcFCno2DL06h2V7TmRpNbWYyqmmZl80GPPtf5:pyIZcno+sVWJVyr0Gntf
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-