General
-
Target
881b82a44e8578b6034c504725c33b6a22d1980affa052c4bf492c168915dc8a
-
Size
802KB
-
Sample
241121-yl6dvswkey
-
MD5
66fe9fc4a048631ec4ac9bc4ad55f501
-
SHA1
302188f68b430e20f0f28d8ec9697a216e341d79
-
SHA256
881b82a44e8578b6034c504725c33b6a22d1980affa052c4bf492c168915dc8a
-
SHA512
71b6fa38cc25d2ceb360b6b6ac6d725cd2137d8e4cd660bd1829997d2223ea9123d247006b3afee96e650b9014871b1d9579d69faa590c6501016a3152243530
-
SSDEEP
24576:dLa/diQs7a/ichDPvzoKndNQ2dliGBUam:dLlW/Nz/TNqNam
Static task
static1
Behavioral task
behavioral1
Sample
881b82a44e8578b6034c504725c33b6a22d1980affa052c4bf492c168915dc8a.exe
Resource
win7-20241010-en
Malware Config
Extracted
xloader
2.5
q3c8
illstarttommorow.com
ll-safe-keepingtoyof5.xyz
mygreenequity.com
albionadesign.com
byzalikha.com
robinson.tools
mrd68.com
mw13racing.com
pirankaliyar.com
nropes.com
indigosrc.com
drsyverson.com
aprendes.academy
mundohightech.com
sarms-research.com
ilmarijuanadispensary.com
qabeta3473437.com
businessmastercenturion.com
axissol.net
market-oplata-23v.xyz
golduce.store
mumidom.art
addpremium.com
crypmf.com
jtshrimp.com
healthystart.today
boler-eco-tech.com
maidclean217.com
carolinatrade.group
rjsimmonsinvestmentsllc.com
telenor-no.com
marianomingotes.com
stintohytkyv.quest
costaldachshundpuppies.com
centogrisolia.com
cchaplain.com
equinoxcoven.com
apachejunctionhouses.com
kayskonjure.com
bezandfolium.quest
shouwei.store
workshopabc.com
my-story.store
transplantedecabelloarweb.com
rfberlin.com
rarityfarms.com
binarycomic.store
libtardssuck.com
calculation.pro
atalyk.net
aaracyor.xyz
freecvshare.com
applemorning.com
jmartinsinfra.com
coroafracaeventos.com
xn--grlitzerseebhne-8sb7i.com
globalpowershop.com
bitcoinbeachroatan.com
mascotaexotica.xyz
effiebowling.com
keencove.com
politelyoffensive.com
ipswich.team
nationsassociation.online
bascountry.com
Targets
-
-
Target
881b82a44e8578b6034c504725c33b6a22d1980affa052c4bf492c168915dc8a
-
Size
802KB
-
MD5
66fe9fc4a048631ec4ac9bc4ad55f501
-
SHA1
302188f68b430e20f0f28d8ec9697a216e341d79
-
SHA256
881b82a44e8578b6034c504725c33b6a22d1980affa052c4bf492c168915dc8a
-
SHA512
71b6fa38cc25d2ceb360b6b6ac6d725cd2137d8e4cd660bd1829997d2223ea9123d247006b3afee96e650b9014871b1d9579d69faa590c6501016a3152243530
-
SSDEEP
24576:dLa/diQs7a/ichDPvzoKndNQ2dliGBUam:dLlW/Nz/TNqNam
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2