General

  • Target

    5479c43c_by_Libranalysis

  • Size

    759KB

  • Sample

    210505-55pt3pgs3e

  • MD5

    5479c43c28d4286d39041482778a9c82

  • SHA1

    4accc679c637a8ec24956db8990c4042cc402131

  • SHA256

    8855c73a66320b1d62c22f7af62feb301d13e4b68f4edfba64bf47473ad58c4a

  • SHA512

    a1a8666f43468dcc5569a59f9c31beff715fe185885dd0ec6643b119e2ae533040644a960b7ae1dee08008d05f2ed07d3e3e745abdb8a9751a2f711191eea9dc

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.austinenglishtutor.com/ipio/

Decoy

fatiguemanager.co.uk

malignment.com

fashionashton.com

soawstservices.com

gardengarages.com

affirm.digital

savetheboxes.com

stepupjam.net

sassyfurbaby.com

rarecares.institute

hisarsteel.com

thespotifygrowthguide.com

111indianbend.com

kizilaykorkuevi.com

zeegostar.com

scuolateatroarsenale.com

dyaspaar.com

no1jt.com

gain2020live.com

dearhim.com

Targets

    • Target

      5479c43c_by_Libranalysis

    • Size

      759KB

    • MD5

      5479c43c28d4286d39041482778a9c82

    • SHA1

      4accc679c637a8ec24956db8990c4042cc402131

    • SHA256

      8855c73a66320b1d62c22f7af62feb301d13e4b68f4edfba64bf47473ad58c4a

    • SHA512

      a1a8666f43468dcc5569a59f9c31beff715fe185885dd0ec6643b119e2ae533040644a960b7ae1dee08008d05f2ed07d3e3e745abdb8a9751a2f711191eea9dc

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks