General
-
Target
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00
-
Size
304KB
-
Sample
241121-ynxvhazqbm
-
MD5
4251d6e3ac2866a8087ca3f682cadbdf
-
SHA1
fc0c6d7b8f39b388ff64c0e15d35c136bef5a79b
-
SHA256
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00
-
SHA512
e8936b50782ba9b6e50109f04b645049e33d978c77f39f45fcf3730d4f71b55b08bf777118a17c728b191f982d21ccbbb9ddc0b01c1ca96b58e0ce3df60d2e97
-
SSDEEP
6144:rGiCbmp18OIycnYCh22kriWLF0DJS/b4cAtTynWn206zambrBetaDX/1:1V/dChOcSTUtT3cagrMaDX/1
Static task
static1
Behavioral task
behavioral1
Sample
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/tcjngvzun.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/tcjngvzun.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
xloader
2.5
xa9e
shellthatsells.com
ocelotsdigital.com
worldladder.com
florapac.com
midnight-express.biz
pantherproduct.com
cumits.com
dittamd.com
w388bet.store
muyuanshengshi.com
scrappedmovie.com
investordefence.com
coupdefoudres.com
sideralmkt.online
travwhizz.com
daniellestienstra.com
corbelladvocats.com
annocadans.quest
gabrycancio.com
petrocan.online
gvtklyraqyhb.mobi
ecoenviropost.com
ottosperformance.com
cantoparaelser.com
cdhbyhs.com
extol.design
actibasic.com
tymeesunlimited.com
motodevi.com
teamolemiss.club
d3uc3.com
freedomnofear.com
infiniteviu.com
dewirachma.com
foxstudent.com
henrywrench.com
ethercut.com
onlinetreedoctor.com
1980sy.com
gkynykj.com
airjetsprivate.com
reysbeautystore.com
arstic.com
vacation.works
vjmidias.com
passengerslocatorform.com
abreakradio.net
webworz.com
thebenlystastory.com
vcmetaverse.com
qtomdnwj.xyz
veronicamariefallago.com
portnoyenv.com
treeshirtsplus.com
budjonathon.com
manna17.com
wascowarriors.com
kreativame.com
mpengineeringsolar.com
xpj43234.com
jaimdecor.com
drillpresscenterfinder.com
palmoilalternative.com
woruke.online
byl788.com
Targets
-
-
Target
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00
-
Size
304KB
-
MD5
4251d6e3ac2866a8087ca3f682cadbdf
-
SHA1
fc0c6d7b8f39b388ff64c0e15d35c136bef5a79b
-
SHA256
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00
-
SHA512
e8936b50782ba9b6e50109f04b645049e33d978c77f39f45fcf3730d4f71b55b08bf777118a17c728b191f982d21ccbbb9ddc0b01c1ca96b58e0ce3df60d2e97
-
SSDEEP
6144:rGiCbmp18OIycnYCh22kriWLF0DJS/b4cAtTynWn206zambrBetaDX/1:1V/dChOcSTUtT3cagrMaDX/1
-
Xloader family
-
Xloader payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/tcjngvzun.dll
-
Size
156KB
-
MD5
5b93103b861e156f69643e0c7ac84017
-
SHA1
5050ab7ffbf02899505ae533b8879d3db076d3d4
-
SHA256
fe4ef7dd57a355df3cf0bf52fb3d0409e4370178a507639fc0ea179cc4ea6843
-
SHA512
91484cbc4bcbff8e00ec20ce4fa54c1affc07c6889ad52246f7f1d7a2700c1a59b4c38cff2a16464b2403a610112f2ff488a6a52eb2756917d0bdbc96c5e664d
-
SSDEEP
3072:eQqOWJi1e6eUopxXEn29mESRkZkG/5UupblPtiSqxMUF2oLDlBYWpxa:L8KUX8EtN06UAofY
Score3/10 -