General
-
Target
e152ae72c09a655a5549a6509e7a0fdae6b203a02554b7cc6ccb345d25888bb3
-
Size
427KB
-
Sample
241121-yw6sdawngs
-
MD5
4581d173a478085421f5b8f302574e77
-
SHA1
1476573dcfa2daf1d7ac9949226e96fe7d519b5d
-
SHA256
e152ae72c09a655a5549a6509e7a0fdae6b203a02554b7cc6ccb345d25888bb3
-
SHA512
9574b242bf49d85d2bd38f60a484e68eaee76df9bf5a09db1a582bc03cea68a73d791788dd7b32213b30e735417cfe1b83d767ea15249e9629c48aac2cd96007
-
SSDEEP
12288:+EfyWXG/jssrEBep/06wy+UXXatbzUdFu:+T4LI/Dwy+SX4bzUHu
Static task
static1
Behavioral task
behavioral1
Sample
Y0GEeY1WOWNMYni.exe
Resource
win7-20241010-en
Malware Config
Extracted
xloader
2.3
bfhm
martensromania.com
e-cans.com
solarinverter.pro
threadluvapparel.com
livesarchitecture.com
velozgroup.net
xdcasdg.xyz
parsindoor.com
orderdonki.com
jingbangjy.com
dfjdfjtriurti548548548.xyz
au-cl8.com
workingclasscompany.com
wrjunk.com
debratreesaudiology.com
nuwearco.com
theteaverse.com
quanxinpdd.com
dabanse.com
pyztsl.com
hoplitesolution.com
ezeefashion.com
studyabroadalumnitravel.com
latitudesatsilverlake.com
matrixso.com
yem8.com
fusiopack.com
electracentrum.com
withheartbooks.com
convertge.com
theprofilemba.com
geminerojerusalem.com
italflavour.com
bemerrychristmas.com
nicolasghetti.com
hotelcasegoodinstallers.com
glutenfreebycharlie.com
mediasourcing.net
daveandlee.com
alittleloveliness.com
ylspsgxow.com
brhtz.com
rabifoods.com
zoratve.com
lihaoyx.com
firstchoicehealthcareclinic.com
studysoil.com
myfoodblog.asia
a7a8.xyz
nationalparksroadtrip.com
muyfaciles.com
bosakfordofchesterton.com
maxembier.info
substal.com
utcpay.com
anewway4nm.com
clairehuntingtonaesthetics.com
567jonesave.com
cakesandsugarcraftshop.com
royalbossbeauty.com
papamom1.com
westbypropertytax.com
kleimenconstruction.com
raouf99.com
politiconext.com
Targets
-
-
Target
Y0GEeY1WOWNMYni.exe
-
Size
678KB
-
MD5
7c45a8542757d9ed6871c12d1d8e733b
-
SHA1
6ffdb6f2b38f45fe00ebd82a074336596938eaae
-
SHA256
7300768cbf7406a287c49de81c675dadd3d5bd4d181afabc533380eac73f944a
-
SHA512
d3fb0653ce229de6f885e7e24ae8fd4ad7de7eaebedbad7e07aff1d08be3b7c95c7133d65b9f72b1b087a634af3ace93e39102c77ded7bc82a1a14e63ab280a7
-
SSDEEP
6144:m4fxbbFJLgGo+lkVSuc8gGzBLAcFiR+Kt15f/OSjFiTTVFcXbCdp8o78HfVNNBI9:ZhlkVJcYB0igX5f/mj2Cd6iN53JJA
-
Xloader family
-
Xloader payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-