General
-
Target
Swift_92be67ab-e027-4955-b6fc-64bd720b2ba09.img
-
Size
2.5MB
-
Sample
241004-j3whnatanj
-
MD5
ab08c0db0905f9720735b6fddaffd41f
-
SHA1
052ec4e9d471e5eff1f0580ac9e14a0524a60801
-
SHA256
b675746c857466afebb1baf0fa1f3d58a0b563604446c58be015dfa2e17d8d4d
-
SHA512
eeb4ebfa6e7d350fd63238cd79cf12040d8bb47f0121d661fcdf2b07934de61a74ac3c11734cc570385818fa315a538358fd92db3cee635446fac7839bb3e7b2
-
SSDEEP
24576:mPNAyYA6foBNp0kdJV4Eac5h+sXDluxEkTj3v6OVOGH+kDs6+5iQc1RZLszJt74x:mP4ApBz4Eh+szkCkTj3vVnekLBGJt0V
Static task
static1
Behavioral task
behavioral1
Sample
Zxooek.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
e62s
ellinksa.shop
uckyspinph.xyz
owdark.net
arriage-therapy-72241.bond
w7ijko4rv4p97b.top
heirbuzzwords.buzz
aspart.shop
ctivemail5-kagoya-com.info
shacertification9.shop
zitcd65k3.buzz
llkosoi.info
ru8.info
rhgtrdjdjykyetrdjftd.buzz
yschoollist.kiwi
oftfolio.online
rograma-de-almacen-2.online
oudoarms.top
mwquas.xyz
orjagaucha.website
nlinechat-mh.online
nlinebankingrates.net
3llyb.vip
42du394dr.autos
ahealthcaretrends2.bond
gbox.net
anatanwater.net
amearcade.shop
ighrane.online
01599.xyz
ams.zone
-mart.vip
42bet.xyz
6snf.shop
nitycacao.shop
arageflooringepoxynearme1.today
c7qkaihvsc.top
amingacor.click
airosstudio.tech
iktokonline.pro
homasotooleboxing.net
ashforhouse24.online
1539.app
atangtoto4.click
ndex.autos
atorengineered.tech
angkalantogel.company
ajudepo777.top
jacksontimepiece.net
gstudio-ai.homes
unter-saaaa.buzz
atageneral.sbs
ingston-saaab.buzz
i5t3.christmas
ampanyaak.click
dneshima.today
angbaojia.top
ubuz.net
pp-games-delearglu.xyz
insgw.bond
7f243xb.skin
roliig.top
wdie3162.vip
reechagroup.vip
op-phone-deal.today
orsaperevod.online
Targets
-
-
Target
Zxooek.exe
-
Size
2.5MB
-
MD5
232b1abbe3ed2387bd727d08716e0846
-
SHA1
d1706a34eed5f8b482655dede78113b5adb04db2
-
SHA256
5a11fb6ef4be30e7c7a65a256f659fab6b0833f4d32c4922f6fa36b663eb8bb3
-
SHA512
6205cd30eed573c1dd563adc87be51c21bc14eba36e5ab1e756f715a77e33edf2e97b7884a8b7d2d5c02502495f7dc4b15562237058490d0934aa2b5c985c677
-
SSDEEP
24576:fPNAyYA6foBNp0kdJV4Eac5h+sXDluxEkTj3v6OVOGH+kDs6+5iQc1RZLszJt74x:fP4ApBz4Eh+szkCkTj3vVnekLBGJt0V
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Formbook payload
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1