General
-
Target
752966b8834739951d9ca0e169f7750b7d74363db3fb9e1af55ab44e692ad578
-
Size
731KB
-
Sample
241121-ylwjnazpcp
-
MD5
b9bcec9c8fe1a86713973ff28d33f948
-
SHA1
ef8150b02a2cbde39a101c061b57a140a75cefa2
-
SHA256
752966b8834739951d9ca0e169f7750b7d74363db3fb9e1af55ab44e692ad578
-
SHA512
3f011256cc8e37faf2d685107ffb23595db26b7555969b11948b981d560dea9527c1ea16eb6f21672ec6fb8966e3900f1ac796478e45dfa1ed2610f6cd350538
-
SSDEEP
12288:kAykyaaHy4sd4PM/pMqZbe1w/dVLQ96zKlHIy2Oer+wyoGkK3NIhjadV82KwxG/P:kAAl9sWk/e48QdV86zKls+wzmNIhjadq
Static task
static1
Behavioral task
behavioral1
Sample
81b66d8cf175ecdcfdbb113d8e020aadef3537b7060ec4f2588cb81724a69e3a.exe
Resource
win7-20240903-en
Malware Config
Extracted
xloader
2.6
pdrq
welchsunstar.com
mppservicesllc.com
wiresofteflon.com
brabov.xyz
compnonoch.site
yourbuilderworks.com
iamsamirahman.com
eriqoes.com
eastudio.design
skyearth-est.com
teethfitness.com
razaancreates.com
shfbfs.com
joyfulbrokekids.com
kjbolden.com
howirep.com
deedeesmainecoons.website
e-powair.com
aheatea.com
shalfey0009.xyz
designcolor.style
netflixpaymentpending.ca
bothoitrang3.site
motondiarts.com
staynmocean.com
miamivideoshows.com
berendsit.com
yndzjs.com
yiwenhome.xyz
royaldeals.net
clearvison-ts.com
peluqueriasusanagalan.com
thelittlewellnessstudio.com
gurulotaska.com
smgsj.com
followpanelbd.com
prinirwedding.com
3559.fyi
amcvips.com
bigroof.top
chipbio-zt.com
candelasluxuryretreat.com
jboycephotography.com
affiliateindex.xyz
grannysseasonings.com
lcl-inc-test.com
beadallcreations.jewelry
yzzhome.top
tobe-science.com
cincinnaticustomrenovation.com
survaicommercial.xyz
businessdirectorymania.com
phqworld.com
miamigocars.com
labfour.systems
gregoryzeitler.com
dj-mary.com
one1-day.com
vegfiber.com
sfbayraw.net
xn--bndarsloto-s4a.com
felipesb.com
108580.com
1swj06mjrowgi.xyz
koalaglen.com
Targets
-
-
Target
81b66d8cf175ecdcfdbb113d8e020aadef3537b7060ec4f2588cb81724a69e3a
-
Size
806KB
-
MD5
deaa34eaf2e31504aebbcc53af44d4b4
-
SHA1
4f47579328d55a56a8e69906b5deb3c3235865f3
-
SHA256
81b66d8cf175ecdcfdbb113d8e020aadef3537b7060ec4f2588cb81724a69e3a
-
SHA512
fc338042c184d05789c5841893c47cf58f4cbf452fd2f649a5e04e7c1dd3cc2c3817940e574b1a09ba2ba5bc56ba27f6756a2f2818273354b61dcabb1f6e0f63
-
SSDEEP
24576:8INl0VrLH7hR7dVJm3LUYbyBWBAsXfIPJodP3CIzeg:3l0VrDXvGLUMBAsXfIhYP3CB
-
Xloader family
-
Xloader payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-