General
-
Target
7097c7689a872b74cc3eed23f91f1622c0789c12bf887b9a6298c4f49f19346d
-
Size
796KB
-
Sample
241121-zg3mvaxmew
-
MD5
3de259462a69a83b48ea51ebf35e5195
-
SHA1
d2719a1f8d44311ba23148f2b8d872aacb038ef4
-
SHA256
7097c7689a872b74cc3eed23f91f1622c0789c12bf887b9a6298c4f49f19346d
-
SHA512
c2e4f97ed7bee6a0f1e44721222db904ea56981341f1da9ef426091f6c1bc59706be23cabec339221597726315d2c57101256d8ee15119f8528e3f9a32d163ac
-
SSDEEP
12288:3uKPTtfpxazi/JFQ2WCZJ4j00OD7LL+cnKhhJlKR2y+CpsQIO1jlqVcBmCBCs4QX:3u0Yzi/J6OyBCLCcKk2yxZWVKmCosFX
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT k.exe
Resource
win7-20241010-en
Malware Config
Extracted
xloader
2.5
i6ro
annahve.xyz
636851.com
cngm7e.com
iloveapple62.com
zdbhl.com
becu84ts.com
buongpuso.com
qhwl2017.com
savarsell.com
anentbottskeen.com
vyounglighting.com
executive-air.net
elaish.com
ilmarijuanadispensary.com
online-bolgar18.com
qubtantoys.com
tkspoboys.com
hackensackfitness.com
bitcointradel.com
nightcanteen.com
skillga.com
luckyfandom.com
tonghetaiye.com
victoriajayde.com
domainsraj.com
campervan.love
sumiyoshiku-inoitami.xyz
gpawidegroup.com
potserve.com
sdunifiednursingcollege.com
nutcrackernoww.com
australishomes.com
salonautostock.com
carbsupplements.com
zj7aszamjwe3.biz
bundesfinanzeministerium-de.com
petips.xyz
woodstor.com
common-criteria-isac.com
kidskarateonline.com
fisioletsgo.com
thelukeliu.com
boxedwallconsepts.net
nvgso.com
hanssuter.com
proceam.com
sehatherba.online
goldenconcept.art
zaar.solutions
turmoilgomkww.xyz
subritulandoando.com
rashil.digital
airlesscondimentdispenser.com
eygtogel021.com
freeadakahamazon.com
sahumeriosartesanales.com
tackle.tools
sharifulmer.online
rushpcbtest.info
epilepsycolorado.online
birdy3000.com
aracsozluk.com
air-watches.com
xiexingyu.top
healingandhealthy.com
Targets
-
-
Target
SWIFT k.bin
-
Size
1015KB
-
MD5
74edec99d7bf3b8c7d97d0a4d4d29b64
-
SHA1
444e8af17aafc45430e7051126480d60dfa47966
-
SHA256
0403e4b3772f23e41ccdde464fd1bfcedd517bd3c87f3f7652b2c55aee755376
-
SHA512
c374c62e51109ece72910644f4ac8094defdfbea3c8c456bc2983d55f692c6f0542593f4f00db434a660bbfe3fda0c52251ee0cb82ed6aa5209f10e4cbf42b08
-
SSDEEP
24576:fqeXxJ/Fl1+LZVCS+9ESK0NRmyMUfus6suP:jXxJ/Fl1+tGXNRLrP6f
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-