General
-
Target
fe62c3e75f40fdd55627df462b423c6f6004b26e454041ff115e755d1c26120b
-
Size
107KB
-
Sample
241121-yqxmhswlgy
-
MD5
5b8cd759af56daf685bf58673b7f1a9c
-
SHA1
a7593f03acd52cfbd15bfa24ba281ecb8dcd98d6
-
SHA256
fe62c3e75f40fdd55627df462b423c6f6004b26e454041ff115e755d1c26120b
-
SHA512
540184b570c1ee87160af463931e85c5aad5c6ddd8c2a8afd5c5828456a94843234f70a41e178bda224215752990a947a27826e450d4b23b11f09afb884bfd17
-
SSDEEP
1536:li9wQ+rziMl3ic1VtlnRVXPI/GboV/ZnYtZrYpEybIEnUVaD7+6P3Gmx+ddhYPLd:kMrzPl3Zsme5YnklbTUVm7+MGmx62LfF
Static task
static1
Behavioral task
behavioral1
Sample
ATTACHED ORIGINAL REF __NOTE.exe
Resource
win7-20241023-en
Malware Config
Extracted
guloader
https://drive.google.com/uc?export=download&id=1-7CEqaIs0xr7KeLf1RsQKlZCjSlB91Jb
Extracted
xloader
2.3
i8be
cdymjim.icu
globalmilitaryaircraft.com
slusheestore.com
freepdfconvert.net
itadsweden.com
legenddocs.com
metholyptus.com
966cm.com
mobilitygloves-protect.com
travaze.net
go-kalisa.com
believehavefaith.com
nywebhost.com
semitsol.com
wowyuu.net
cochesb2b.com
gobesttobuy.com
senmec23.com
bmsgw.com
newazenterprise.com
onlinefitnessmechanic.com
makeournationsafeagain.com
climat2020.com
hamsikoysutlaci.net
networkslice.com
wanganwanderer1.com
nationwidesignage.com
lucianmediazone.com
geekyweel.com
hzky888.com
mcfarlaneweb.com
c-w3.com
covidstracking.com
flowingwealth.com
sprinklesglobal.com
secret-mall.com
extraclasss.com
stasiapl.com
1905vintage.com
8649gb.com
brisketbeard.com
optionsafecode.com
foms4om.com
differentquartz.info
freshly.pizza
levettfyneralhome.com
leteeshirtboutique.com
creativesdanfe.com
t-oils.com
seoforamz.com
carbon2algae.com
kronospros.com
storepisode.com
viautong30.com
weipr.net
mjspizzaandwinghouse.com
e-yzr.com
webcamthing.com
wb917.com
sedentariocero.com
salon-solution.com
solgeneration.com
viviennevaile.com
weightlossbiloxi.com
innovativevan.com
Targets
-
-
Target
ATTACHED ORIGINAL REF __NOTE.exe
-
Size
252KB
-
MD5
995a9f0d72ee6407f3979543930d80ae
-
SHA1
8e38d89ab142ccbfb95952f873f49df56ab65055
-
SHA256
77a74587d301dfd79d5c60a874ac580e83c389e8566261f60b09d87cdffa2e38
-
SHA512
f72e8016c05880bc5a338266e5f4859b88c3c66b262264ce48fb30ca4efbf53eb6101579f46c4f83794ebb332a78e45bda8088b9707454b959a640b0b3278f1e
-
SSDEEP
3072:A1p9M3scGOWyLvr1f+lwYuJIVPUVJXgcAm6S6l7g98HimFx1zeBgxX:3nG1eJffYuJ4cVdx36Fl7U8mBe
-
Guloader family
-
Xloader family
-
Xloader payload
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-