General
-
Target
a4336bf3d57e83de94cf7e76c06df4b04f6041e646b073d873e6746f61743a0f
-
Size
686KB
-
Sample
241121-zc7e8s1ram
-
MD5
e8ba66294d12279e421be167524a1443
-
SHA1
44e983e48948b2e5ba41d52acbbe73d207d516fb
-
SHA256
a4336bf3d57e83de94cf7e76c06df4b04f6041e646b073d873e6746f61743a0f
-
SHA512
88a64c6893321fb0441f8376c590e77503a53c92d1f969c94019baeedac4edda8f071ae0e89d4c8fcc3cd145d3886fd5dc9cf880a8f0016ab5ca3bad3a0347a8
-
SSDEEP
12288:YW4oqJqGrHx6rhAl04AjMoT2l9ujFBz9CKUP/2cDRO6nmMjGczRLhITZ7b6qrN:GoqhxWhvjMoTEm3k7/VDROamQTmZ7bhh
Static task
static1
Behavioral task
behavioral1
Sample
f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe
Resource
win7-20241023-en
Malware Config
Extracted
xloader
2.5
nbm3
3881a.com
abutuandui.com
halo-airs.com
nu865ci.com
fssqyd.com
pacificsunseattle.com
sellyourfobs.com
eniso-team.com
ciscenjedpffiltera.com
furriekids.com
dspotsg.com
amanispartydecor.com
wrih.top
rab-verlopen-pas.icu
alircep.com
rangeroads.com
bugattiveyronhypercarnft.com
dominera.net
jux565.com
licenseoriginal.com
theseasonedsnacker.com
espace-futur.com
danette.xyz
hardayumangosteen.com
devapplab.com
kondz.com
suddennnnnnnnnnnn37.xyz
blackflagholdings.com
startuitive.com
helpforhospo.com
techstartups.info
china-ycgw.com
custsupport-louisvuitton.com
hungstore3.asia
cookinkele.com
sasharose.com
usaonlinedrs.com
accollectibles.net
tslsinteligentes.com
jorgeknowshomes.com
xaydungvihouse.com
u0biitep9.xyz
roplseason.com
nanren0722.com
helperdating.com
648871.com
shamta.net
indianpharmacymedical.com
trfcshl.com
myhelpstationorlando.com
originalpluss.com
eksklusifinvestment.com
bringmovies.com
mofankeji.online
rubotic.net
kenkaneki.tech
ratliffroots.com
cryptopricescam.com
samedaycash.loan
buildlaoc.com
pipandelli.com
livemarkt.com
tetupo.com
faicai.club
venarypad.quest
Targets
-
-
Target
f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70
-
Size
1.0MB
-
MD5
9d73b42ce002d0964ac552c4a8be3652
-
SHA1
86942687836cc75e082399acafefcf17f40c6606
-
SHA256
f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70
-
SHA512
4d768f775e56ca96898657d908c062056f94c69e8765bec277df6c5f9f359446771c17988488836c7e7c281200ced151983e1b690161bd60ff9f2394715889d0
-
SSDEEP
12288:Wx76RAQOEhGkEHIxZEfzZXbpC+MRxkhxSU739+MAC80dRXXr3SONMTW2KgcYM8+M:YadgVOExA+LQG2CpzXXrNns
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-