Malware Analysis Report

2025-06-16 00:20

Sample ID 241112-vbvb3awjdz
Target 7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe
SHA256 7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428
Tags
discovery persistence spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428

Threat Level: Shows suspicious behavior

The file 7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery persistence spyware stealer

Drops startup file

Executes dropped EXE

Reads user/profile data of web browsers

Loads dropped DLL

Adds Run key to start application

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-12 16:49

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-12 16:49

Reported

2024-11-12 16:51

Platform

win7-20241023-en

Max time kernel

120s

Max time network

17s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe"

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\VidCA\\dobdevsys.exe" C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\AdobeAL\\xdobec.exe" C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\AdobeAL\xdobec.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe N/A
N/A N/A C:\AdobeAL\xdobec.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1956 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
PID 1956 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
PID 1956 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
PID 1956 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe
PID 1956 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\AdobeAL\xdobec.exe
PID 1956 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\AdobeAL\xdobec.exe
PID 1956 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\AdobeAL\xdobec.exe
PID 1956 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe C:\AdobeAL\xdobec.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe

"C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe"

C:\AdobeAL\xdobec.exe

C:\AdobeAL\xdobec.exe

Network

N/A

Files

\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locabod.exe

MD5 6f863215140b0c0b991e05dfcf0bf4a3
SHA1 3d303ea77bd125298b4ec81ec70c7f3b8a35fdb5
SHA256 9c45a67ecef99e6ab1c757fd435ec9c061e36cb83e2d5a37a8546f3fa10c8f70
SHA512 a5c8d41ded5bbca277ee14c1c425eda25f37b9ec196a084569dcdfb7ddd8b25d1569986de5e1392ad5fbe8aa5aa64e52313358392c341819923b93594c0fdebf

C:\Users\Admin\253086396416_6.1_Admin.ini

MD5 001f2fdcb33c3b36f249decfe708e6ae
SHA1 61f1dc4674a600628cb5680a866c68ccda58824d
SHA256 6c037f66ec8687263bab42bb211e32570585c03a83ea7221de1a2bf7ed47f274
SHA512 609497c66e0e18baa73c9b33504777366168b97449de3c603d728f4d14209e2c0fc3d7aa68ee841d9ac5032dda7228f8f8fb2270c076fc3c3583b5122da7a2e3

C:\VidCA\dobdevsys.exe

MD5 eaa5e4853533b1eeda6f065931411762
SHA1 eeb92769d323f22ab7993588cb1899dce5911a49
SHA256 2ac9848c584f4d288d53fd7ecd28b967f6b6cc6b577b57d3f87f26e6b8bb44c2
SHA512 3ceee8b23914e0050d85db4fc39624ffbe06afe70d3a6e268d34089ad073001ccb1c1965a186af73854276255235039043b2172e86bba9bec598cb552e1626f2

C:\AdobeAL\xdobec.exe

MD5 88d61abe9fc0c026d7dab97d7065e76e
SHA1 559acfebe8517111bd2876a2086320e652da36e3
SHA256 566938447a8acea9fcfd42f836d4ad98a57f5d19e2038322dbef27179c8794f1
SHA512 c0a706c1c84659da47a2c89ec947e7e1a1c2494c4fe7abade714d3193f4aac67d4ee13b6c372c56e16f864ad3374e950ff15a72b1c609b95a939b7c9ddac4ef2

C:\Users\Admin\253086396416_6.1_Admin.ini

MD5 478aa919f81de7d378b919c2d71129f0
SHA1 0a3d43f941cd77384a136bc1e1c7b15c68a56c2a
SHA256 663115e45d9bfa70c06cca8617aea58d2a2a2a9fe81aa988ed06791d2cd317c5
SHA512 c720e809f98af8548a26c6c792a6a8e2525e27e2b28fae704573e030b1f45a974888cb48c983373496a570b75370c2d9afa5770698a02ab85d4c07abe7661bfc

C:\VidCA\dobdevsys.exe

MD5 d4de867007e2b9d82ef4435e69f4ac56
SHA1 606e1c5f0cc271742ed447e405ee6b94e94f34e3
SHA256 c12003d5114a36327ff07ba7c85c181e8d037410efa83a8707524c1cc7260af9
SHA512 68176ec2a07b104390f9192218f49d8b850309315b63d952cce0d06a03feadb23b166ad4202c525977a21ddbaf6553fd6ab64ea39254c9272895aa31f0d3b241

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-12 16:49

Reported

2024-11-12 16:51

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

100s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe"

Signatures

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\GalaxQB\\bodaec.exe" C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\UserDot9H\\xoptiloc.exe" C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\UserDot9H\xoptiloc.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A
N/A N/A C:\UserDot9H\xoptiloc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe

"C:\Users\Admin\AppData\Local\Temp\7458ff7069abc70a68833d64787e030cb373464b051b77cba37806bfa3e0c428N.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe"

C:\UserDot9H\xoptiloc.exe

C:\UserDot9H\xoptiloc.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 105.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 70.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\locxbod.exe

MD5 71ef51d55e463bbc9f6764289ea08023
SHA1 6378a168c433cd13b5acfe122070e76a9e20de0a
SHA256 c8adbb95dfb10aa5057961889237bd10fd939f25e4cbbe3d4489b92c3e219152
SHA512 180aed5e0ef98c1312a2c179da9852d6e3c090d7f9fb93ea94dc2d71d2e6a79a96b4a48da709554b43b722737c8b0fe98254c6b363bd5bb7af8df1f9cfcf6c60

C:\Users\Admin\253086396416_10.0_Admin.ini

MD5 dd6106f606da4c6b5aaa5beffb133726
SHA1 c400572c25c31291961f9e4ba18c412387a6bb3d
SHA256 92a7bf867707934677957a2bc5052707986c7bc88fd17f3fd013d26659035c32
SHA512 3048c1208e9215950469e5fc01d2c4062c3a299ecfaea506b583013f9b8c88f4df4fce68f4175077f6330747221f1e18f239ed6ac197336cbb7ea94e72cfb8a2

C:\UserDot9H\xoptiloc.exe

MD5 0c4b64916ce69274cd527b0d002b7707
SHA1 ea6b0407f91b82ede18461fa99eb642858c43790
SHA256 9a0f7478beed5f7620257d4841ebaafde05a19e50c3d10210a0c1631c440f1c2
SHA512 0a3e60dc5248820ff5150e0586f42eca114f5b7883c62d2d66d03739f64840f7ee0ee4f660a2863eece28a2d33dc33e29590bbac5bb87e03071a09b124b2ba6a

C:\GalaxQB\bodaec.exe

MD5 9262cab29eba6c8ec58cf55dd510774f
SHA1 9c109088d1dc40745dede1654950cf3c14a07d0e
SHA256 e30f45b4f1ee5afde05ab748a8efaf1830710f480600bd9792e3a66ea5f9f945
SHA512 2241d5680489d6b0281a7b46d1c23f8106426f9078273c98fc99c381f0e3e738acc7e4684387d72ceb40a071fa85ba9a8df3e8edc6bb55c25a029dbebf437004

C:\Users\Admin\253086396416_10.0_Admin.ini

MD5 dd1fd974b41154cb91d0260ba3e360ef
SHA1 31fc359c579d0f739a178df033518024ba675408
SHA256 2f6eba9b56b38b4ad77fe834b30a752ab713eb73653734507316eabbab43bf44
SHA512 f44cf06b919deea05231f0ea9452197dc5a5a8f5deb3c0936e63285651b48c5d396ff2d9f8fa21d697cdf46f42e26dbec8440dc89eb58d5484d0ddda670f1109

C:\GalaxQB\bodaec.exe

MD5 5bfe2b9716e543bdee47798a769839d9
SHA1 878191dedcf35a996a83e354a56493f6cff7fb4e
SHA256 2ea00a57dfcae75cc4deffe5f42850f1bd1b1e66f0892fc16209350bb2e9f0f7
SHA512 305f3dc3d78edde1d50e68bfb5e21db1185e8bd389bfe9eb8e12ee504a37e2fb0e7e8ab49bc0508b46bc99fb39eb935c7657e2f0bc40ec948fbf615710b1adf8