General
-
Target
587dbf96979d7f8de55234e0b9c2f41332ecbfcbe9260b5ed2ddca34bfbc4391
-
Size
676KB
-
Sample
241121-ysw4rswmdv
-
MD5
69d56c80ff5b930a05f94752415affa9
-
SHA1
a1f99148e6d121cfd4fa4de2d78df4476cb375ab
-
SHA256
587dbf96979d7f8de55234e0b9c2f41332ecbfcbe9260b5ed2ddca34bfbc4391
-
SHA512
1d9ebec2d56dfe341a2ea1bf897552d329127b0949c39733ca9d42433f2b00599f05b1ab7b9fb577bd2d96565cff6d8cd40dd3d05e04a8b356e5b6a12b55c3a5
-
SSDEEP
12288:Vo2H3ngytUEeYiUibVXaGOFqd5OAQ7TdgPjrRHsR0F1Xt50WcFlKkNYQB:GgthzwCFqLOAQ1IRxdt5iFl9CQB
Static task
static1
Behavioral task
behavioral1
Sample
HAWB AND INV.exe
Resource
win7-20241010-en
Malware Config
Extracted
xloader
2.3
maw9
jaimericart.com
mayavantcard.com
romanzava.site
forefrontunderground.com
grafikirmarketing.com
airpoppoff.com
captureq.com
vph.ventures
historiclocation.com
theoxfordway.com
springersells.com
huther.mobi
networkingmaderas.com
reggatech.com
dollfacela.com
moneycrypt.net
calidad-precio.net
hamnsk165.com
victoriabrownrealtor.com
itechfreak.com
bernardocammarata.com
alfredoarlington.com
rencontre-montpellier.com
vipbrandwatch.info
nhahangminhcuong.com
senmec23.com
onemoreusa.com
dinkoistmatrimony.com
ideasparatubebe.com
pozickyauveryinfossk.com
buildingba.com
heoslight.com
ventadecalsotsdevalls.com
app-cintavcsuges.com
culturaenmistacones.com
whyiamvoting.com
blackopstravel.club
poorwhitetrashlivesmatters.com
beachrockisland.com
natrium-ionen-akkus.com
noxi.store
whichrace.com
mindfulprovision.com
nznatureguides.com
fullautoimage.com
sharonbakcht.com
ournursingdegreesworld.com
parismedspas.com
premier-moment.info
curvygirlholiday.com
getsuperyouth.com
177palmer.com
headstronghairstudio.com
sasdrawing.com
drinkhydrateyourcoffee.com
globalifier.com
protocolpolitician.com
edinglow.com
isimplix.com
trendylifefashion.com
ferhou.com
ellarewster.club
ecosanhn.com
newedulist.com
alldaazz.com
Targets
-
-
Target
HAWB AND INV.exe
-
Size
724KB
-
MD5
42662765a94ce5ece11529509f937711
-
SHA1
da57dd4c137c47fc9b906caaf067c6ed13fa2da6
-
SHA256
2138325dd5e2825ee4086187a944af336476b0327e1ddae7563bb24523836e08
-
SHA512
101d7bb5f778e779133f005c801fa26cf1bc147fed9f2774808526c50b3ae8e12863bc7ee3dfb060153d4b0b3a5ef66f357e44d477e1558060fe54df990b4b95
-
SSDEEP
12288:vFAPrYNczrMFJxdNkJ41cx7acIXBFwbk2ldYaZPCwdwfPyfK8vW6M+:vFAjYysyCcGTqnCfPwK8vnt
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1