General
-
Target
837d300e98a18fa8dbbc05698e27588c60cec168b5fc5a095a8b6ddeceb2a069
-
Size
237KB
-
Sample
241121-ym1vrswkgy
-
MD5
1e7dc7f4985a1ce47422ee9c39cc7bac
-
SHA1
c3621aadc98a2bdc09364c9a4fd6ad3c2afd8041
-
SHA256
837d300e98a18fa8dbbc05698e27588c60cec168b5fc5a095a8b6ddeceb2a069
-
SHA512
8413a1f7a1d12550126d07609d7036b3f44687083d6621a1b93a1708f73a433085dc66a15a687b0cffb2cd7a2a74a402beebe755b7e410cc3e9bfc4e4929bdeb
-
SSDEEP
6144:GChaREk9guCRcKEar/Vszx5YyHD4wxsoO79EgKDEU:rEak9BcNtszovzouu9DEU
Static task
static1
Behavioral task
behavioral1
Sample
Rfq_order_item_24062021.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rfq_order_item_24062021.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
xloader
2.3
rht3
sincitytactical.xyz
danangclick.com
walaupulaupau07.com
caselnk.com
abcnwqs.com
lordlinghk.com
unsaltner.com
allocationtestdrive.com
directinteractionscorp.com
paloaltoroofing.info
limchinjoosawmill.com
planetafps.com
elevenstonestudios.com
dqaej.com
generilic.com
sandydigitalmarketing.com
flyingnorthdesigns.com
arrowmops.com
freedommindsetpod.com
fpr.xyz
trippycash.com
topxfix.com
eliteservicessfm.com
theshowroomatl.com
ayurvedicshots.com
bio-cities.com
monkeyhunter.com
invitesdesign.com
ravexim3.com
bouken-koubou.com
interline-simplygenius.com
explorexspace.com
frontlineroofs.com
cryptonecronomicon.com
krishamay.net
royalpizzasandshakes.com
leddepot-1.com
ferramentasdemae.com
kaia-skin.com
wjcgbm.store
rhettsroast.com
fivemonly.com
artsydeedee.com
izabelaharms.com
delicebistro.com
emmacbrace.com
xpj666.life
secundariaramonlopezvelarde.com
mkbxzm.host
getovercovid19.com
plebeugames.com
vinegrovemc.com
ld14cash.com
virtualroasters.com
sosenaasfaw.com
lifechangingdetails.com
billetterie-franciscabrel.com
sanhesun.com
brilliantbizproject.com
martinisfitness.com
generator-kiev.com
myalsie.com
ecogreenhemp.com
albtimep.com
nokohonpo.com
Targets
-
-
Target
Rfq_order_item_24062021.exe
-
Size
395KB
-
MD5
3914d904ebe3174fbfa604d97cae3a70
-
SHA1
8f175b52d4c770821af2d15dc0913e721316ad08
-
SHA256
d210db96dc90cbfc39b183fbab1bb9f59bd321101fbc7c405a1a4c16e0033863
-
SHA512
11dc78ad2a8c127c9b26d59a20ec5a4fafe22c364b828ab351e9c3255eb667ac9bfcb43a69f23713456204c1ae99db93fcbc858a9e0f7d114b1a337aca4d78b3
-
SSDEEP
6144:RTqjFta/eo1NGZxvk4QumnHU3lg3Z2hHmZIN38hkOQ7iZx7:5aaG4GZxvVbg3sHhNs+J7iZx7
-
Xloader family
-
Xloader payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
10KB
-
MD5
56a321bd011112ec5d8a32b2f6fd3231
-
SHA1
df20e3a35a1636de64df5290ae5e4e7572447f78
-
SHA256
bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
-
SHA512
5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
SSDEEP
192:uv+cJZE61KRWJQO6tFiUdK7ckK4k7l1XRBm0w+NiHi1GSJ:uf6rtFRduQ1W+fG8
Score3/10 -