General
-
Target
00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe
-
Size
857KB
-
Sample
241204-qqa5hswqe1
-
MD5
db0596af906c0293eeb802af1bc3ba4c
-
SHA1
60540d0eedf061c4b22a3144f36cc8a23dfaab9c
-
SHA256
00094c5f5f67e1a091ddbdf88ea507bae9ee4bdb06a0306e27ba4b9285c6e13b
-
SHA512
032eadb161523bd15650823bc9b50e51c3d73d8c247c489199cfa800511cecf5568bdb7b5531acf430973a8b5cd0cd109087c85446311486c0b23575fdc7f4ed
-
SSDEEP
12288:Pay+JMdzTJnZU55m7hDZ/JY1JKuqMs5JPxpn8RzgiH59UhSY:iTJs/vUulYyuNs5Jxpn8RHZ
Static task
static1
Behavioral task
behavioral1
Sample
00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe
Resource
win7-20240903-en
Malware Config
Extracted
xloader
2.5
ahge
zlh.biz
suddennnnnnnnnnnn11.xyz
okanliving.com
shopeuphoricapparel.com
hcifo.com
haciendalosangeleslaguna.com
shineshaft.online
monclerjacketsusa.biz
uwuplay.com
psychicdeb.com
adonlet.com
theprogressivehomesteaders.com
ammaninstitute.com
sqpod.com
tropicbaywatergardens.net
yna901.net
3christinez.online
tastemon.com
karansabberwal.com
delegif.xyz
oceanfired.com
naturalnp.com
lichnii-kabinet.online
typetentfilm.xyz
lkw-boss.com
iwanttobesued.com
hfmfzj.com
tatorbox.com
milderrizene.quest
txperformingarts.com
xxgwe.com
marjaye.biz
noonis.online
rossmcdonnell.photography
nachhaltigkeit-club.com
ybigou.com
starbeckpart.com
atservices-co.net
rw93.xyz
pandacoffeebrand.com
nekosdailylife.com
luxuryhotelnearme.com
louiselamontagne.com
sirikwanknife.com
cigarocks.com
piteucozinhafetiva.com
whoreal.net
354aresbet.com
beauty-rec.com
eimakoia.xyz
pekavar.com
happyteedesigns.com
dropdamla.com
171diproad.com
findcasinoslots.com
theboys.one
afrcansextrip.com
piecebin.com
istanbulpetplastik.com
ferfresh.com
rotaryclubvaranasi.com
simplepathfinanacial.com
casatequisslp.com
zloto.store
amisaar.com
Targets
-
-
Target
00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe
-
Size
857KB
-
MD5
db0596af906c0293eeb802af1bc3ba4c
-
SHA1
60540d0eedf061c4b22a3144f36cc8a23dfaab9c
-
SHA256
00094c5f5f67e1a091ddbdf88ea507bae9ee4bdb06a0306e27ba4b9285c6e13b
-
SHA512
032eadb161523bd15650823bc9b50e51c3d73d8c247c489199cfa800511cecf5568bdb7b5531acf430973a8b5cd0cd109087c85446311486c0b23575fdc7f4ed
-
SSDEEP
12288:Pay+JMdzTJnZU55m7hDZ/JY1JKuqMs5JPxpn8RzgiH59UhSY:iTJs/vUulYyuNs5Jxpn8RHZ
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry
-
Xloader payload
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-