General
-
Target
ba89ade366c193b814186b75bcadc49c528f0c84a2bf9840b38870bc59835e1b
-
Size
1.3MB
-
Sample
241121-zb7plsxlb1
-
MD5
da088b6e7a59be375aeeae16daf75c67
-
SHA1
347c465cac7d0ed0b21490d2ff3e84198c53a723
-
SHA256
ba89ade366c193b814186b75bcadc49c528f0c84a2bf9840b38870bc59835e1b
-
SHA512
7233fbd5138c4ad1885c4b3beb28d4529e2505885d7e1e820e9226b9395a310b650ea58c1ec6eaf04ec2a7291a8e925f1442623478653dcbbd237752e09e0afb
-
SSDEEP
24576:0a2bAGVqfZdRz88Jwko33c3PNABId6nDNQbOJWgXcBXHPMnJ:0a2AGVqR2M565WE0XHkJ
Static task
static1
Behavioral task
behavioral1
Sample
aoo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aoo.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vbc.exe
Resource
win7-20240903-en
Malware Config
Extracted
xloader
2.5
vfm2
swedishchess.com
vanlifedubai.com
srespd.com
aquaeyego.com
mipily.com
wolderland-technologiesmy.com
reidandwriteon.com
realtywithgeorge.com
thomasangelop.com
innotecon.com
alternativedata.services
shogohorinouchi.com
fuliba001.xyz
levelprism.com
auditocity.club
opmatix.com
eds.center
sophia-tokimeki.com
htbrasil.com
trueacademia.com
maildigproductdream.rest
supermanbox.com
onlinesweethouse.com
uismsm.com
jingzhen-xuan.com
tourtasticlanzarote.com
vaytinchaptoanquoc.online
rome-history.com
vedranadonic.com
grannyswaycleaning.com
misstscollectionllc.biz
fyzmb.com
exit-edge.com
welleflasche.com
infotecblockxchange.com
web-extended.info
e-rokho.store
hksquarefarm.com
turiaruki.com
moneywks.com
fliplicensedelectrician.com
seductivegurl.com
wardrobewish.com
maidouxz.com
schermastoricamantova.com
iruka-hostel.com
valuemyaircraft.com
artisticangles.com
suddennnnnnnnnnnn14.xyz
trio-med.store
shopzephlon.club
xkhqlx.com
palette-replus.com
hexaos.com
vehiculosvivienda.com
bolsaspapelcdmx.com
berdisen.com
adultdiapers.xyz
diamonddrivesports.com
claimskinseasonc2c1.com
crd3d.com
baby-mo-mo.com
atlantecanario.com
affinity4healthcare.com
68132.online
Extracted
xloader
2.5
dgrg
iot-vn.com
gamiteisnowjoyned.com
ak8flfqzm8.com
daliborkokic.com
mrk-9.com
tanzibkarate.quest
mburmtdvccti.mobi
thomas-wildlife-control.com
thebritenseries.com
hkkbags.com
redenyl.com
resilientbutterfly.com
nicethelab.com
xn--1lq90isray30ltdc.xn--czru2d
cyberews.net
naclepin2a.xyz
rodrigocoppa.com
hightings.com
chamaaibrasil.com
bdelsaer.com
directmail411.com
nropes.com
nnhhhhnn5.net
silverhavenfinance.com
absolutenuisance.com
pvu1863.com
arrow-electronics-corps.net
gelsinpremium.com
glistonshop.com
needscooters.com
camaras.store
global-forbes.biz
thesuvidhastore.com
baysidecanton.com
data-schwab.com
1w3.space
roofrepairnow.info
thruzens.com
ydbsy.com
timothykmyers.store
best-eternal.com
balanzaseconomicas.com
regitconference.com
whatsappstatus17.com
tdetesla.com
schneex.store
maktabarasheedia.online
tipshalal.net
tinawcounseling.com
mpu-vermittlung.com
airtogether.com
operationservefirst.com
itsajinkyaraj.xyz
doctorsby.com
datemyso.com
fruittys.com
urnam.com
paprikaproduksiyon.com
profitablemechanic.com
townsvillelawnservice.com
cryptoclits.club
retellinn.com
paijuluntan.com
temaksa.com
honeyroux.com
Targets
-
-
Target
aoo.exe
-
Size
984KB
-
MD5
7900dcea134e84a16491a43722518b95
-
SHA1
4c904c97c6d806a86edebe06f0972a8f8d20d6d9
-
SHA256
c349c8a20c6576c397a5dff95fb121e7a16dfdd992e08694a4aacf387cf8c3e7
-
SHA512
099c086a8451d14df7f2fa9af3a953e5121e45206b8e0f4236414bd774db903763845072f80943fc43f269117a79c0363402114f5412402af74cad3b3ec840fe
-
SSDEEP
12288:iEx2iNB0O7yJ0JTlkSuiTgcuj0AzWxNAmydE7Cagkjc3p3srKEZGYKxpeQxx+qx8:71+kxkFHbJzuOdEGa3jc3p3Ap8djxU
-
Xloader family
-
Xloader payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
-
-
Target
vbc.exe
-
Size
821KB
-
MD5
d41735b66e58ebee18f4326df912e28b
-
SHA1
6ee2222ee26abd42c1112841975d2ecc2b09d0c6
-
SHA256
41fd6b520a4abc453b23329a134e661c39aa19b463dc28bfcbf52bf093661511
-
SHA512
40d7c1b90d61eecad860d040d03ef7c3a2ec67bd263f2f1d389ade99655dbd5c567983483c48e0b418d9ded7ced1eece6cc26baa75ce43413ebf520ce339dc15
-
SSDEEP
12288:vFvomht5eIvL6PIJFGMBwbNxZWgT2mn/N4ljTI8Lf8MWakiyfIXy6fsEa:tvvsWweFlBUWg/4lXuFWi6EE
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1