General

  • Target

    1324-62-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    7130abe8b9e7dcea815c81ba8d5e629f

  • SHA1

    c155c4ee14f91f5ac61c4089d59b7ac18a88f8ab

  • SHA256

    2a94116a769e006b759819f5d592073dd27d4726b38076a550557a9a5dfb5bc5

  • SHA512

    f39d00fde2655b62f529b25fca5a00f15b24a233df70d5bb646483cb1eb959e3b644578c8451401fbe76511d2dcb13dfaa4934677a32e193f075e79967ffcaee

  • SSDEEP

    3072:rBksv0vAsrcUJUoPHi9Umct28fqDOvddNYfYy0UORE0LX24uX15REoF:Sv5uoPCyf286OvddNOkm4SzRZF

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ugk8

Decoy

okrmeritacademy.com

loseclick.com

geometryoutspoken.life

crimean-legend.online

thatshiphassunk.com

thelandsmithandco.com

cosmic-awakening.com

alterdrafts.com

safercheckin.com

trevorgray.art

thetracerpro.com

fuckyoucarsonblock.com

nan-ala-la.com

gurumyles.com

paccospizza.com

manggonfah.com

cakepiping.com

culturenails.com

on6energybooster.com

212designs.com

Signatures

  • Xloader family
  • Xloader payload 1 IoCs

Files

  • 1324-62-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections