General
-
Target
fd011c936eb901f9446d52d2497fa88900f28008308b25c8bf56f588ce15e7ff
-
Size
317KB
-
Sample
241121-y2ldmawqe1
-
MD5
b922e2d9c513d0fd2318e5cf772dacbc
-
SHA1
39aacbfab018689237a2557e3583800f59902506
-
SHA256
fd011c936eb901f9446d52d2497fa88900f28008308b25c8bf56f588ce15e7ff
-
SHA512
9061c013dffe5f681ad7c0a7b83f9f67c5a69a3186a4428580e0e9b12ad6d33ef4f7ca94395dcf6503f76a7b0c2b35d897f738cd39d06ead35197f2a598ba466
-
SSDEEP
6144:N5vUVdEW/sgCTnHslsdRgHWWz3bAyw3oPHjrkkYbe5h+d4Q9WHBDId3VPM:NJGdEW3CTH7DisyhHDYbkSVE
Static task
static1
Behavioral task
behavioral1
Sample
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xnozsgld.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
xnozsgld.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Targets
-
-
Target
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe
-
Size
330KB
-
MD5
58a93d1d064b9e8265ea798531adb0bf
-
SHA1
d5e30f238fabd304d30ba2c726c71fb47765b494
-
SHA256
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c
-
SHA512
c5e9c0e07ea8904a45011380836ff8f0b936954729df4fb18f62414322f5815ec8ebc5803729a13b783cf87a5bd723fc821405e3579e017c7b19059e57f76bfb
-
SSDEEP
6144:PYa69K+mD7y0q2hhBCH4m6Qx8qQ5+/ucZiE2TZPwc7j0W6KmZE0HOkv/kBa:PYnUD71qc+6Q+qQuu/Tn396KmLDv/
-
Formbook family
-
Xloader family
-
Xloader payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
xnozsgld.exe
-
Size
253KB
-
MD5
d8394c44bc790e1bdab00823f689c1bd
-
SHA1
735d8986424e2ab3440f49a7a720ecaad43d491d
-
SHA256
234d80febbdd23b49a2ff5db4e51aa33e82cd77ff082ac6e8f32078cdd701007
-
SHA512
c6dd135932d86f6a7ae2b82045e024fddad3ce7286672c134e8314d2a7a003d237b4b62141b67c7947e6ca1fffa78047e015c5e714cfb56739ef152485cd559e
-
SSDEEP
6144:PeQMr6OkeAHYS2FwrkbibMLq70y3Ifos4PLQkSAagi196U51o9R:mQuzkeAHYS2Fwrk2Is3IfoT9SMi196Us
Score3/10 -