General

  • Target

    c8cb664fed47b0347a3e70df2d119327.exe

  • Size

    218KB

  • Sample

    210304-7ekdk1yqqj

  • MD5

    c8cb664fed47b0347a3e70df2d119327

  • SHA1

    26ebf61a4bd3cbef9e294dab68ee8459cfc456e4

  • SHA256

    86071c5800d553ea0cac697f9188a7b592aa9336bf59302545b14aed8b13ce11

  • SHA512

    8aeda509d035a7fe585c9c132d7dbdeb26a2fb64aae5769f275af5d7c79b1ff112a13f0e4f3d7c065ba1e3081f1048cdbb4608625e6552de3c6433aa7ed623e3

Score
10/10

Malware Config

Extracted

Family

xloader

C2

http://www.856380692.xyz/nsag/

Decoy

usopencoverage.com

5bo5j.com

deliveryourvote.com

bestbuycarpethd.com

worldsourcecloud.com

glowtheblog.com

translations.tools

ithacapella.com

machinerysubway.com

aashlokhospitals.com

athara-kiano.com

anabittencourt.com

hakimkhawatmi.com

fashionwatchesstore.com

krishnagiri.info

tencenttexts.com

kodairo.com

ouitum.club

robertbeauford.net

polling.asia

Targets

    • Target

      c8cb664fed47b0347a3e70df2d119327.exe

    • Size

      218KB

    • MD5

      c8cb664fed47b0347a3e70df2d119327

    • SHA1

      26ebf61a4bd3cbef9e294dab68ee8459cfc456e4

    • SHA256

      86071c5800d553ea0cac697f9188a7b592aa9336bf59302545b14aed8b13ce11

    • SHA512

      8aeda509d035a7fe585c9c132d7dbdeb26a2fb64aae5769f275af5d7c79b1ff112a13f0e4f3d7c065ba1e3081f1048cdbb4608625e6552de3c6433aa7ed623e3

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks