General

  • Target

    14500.50.Deposit.exe

  • Size

    712KB

  • Sample

    210505-ky8axj24ls

  • MD5

    93b2ca391610d14085551d30b9b4dba8

  • SHA1

    55e76c4988018dc93df899e2cda607418325910b

  • SHA256

    6bd5e5d02430922bfce2893c805028ae0374fee203235b379856f8bc5f574a76

  • SHA512

    c5f5f4a69885763a1fb620ff3aedc2abb76d648fe521c30bfdd9577e7e682c9343038db9ea640d6016813cab2c791a4caf1b2fc5bd24ae41cbfc1f70ba5f40a1

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.torontoroots.com/bfos/

Decoy

jananihealthprojects.com

harmonize-your-home.com

hibiscuslingerie.com

mauipotatochips.com

truquedevida.com

motchutwibu.net

transformingyourskills.com

vparh.com

apnauto.com

clearspanai.com

gvcofcj.icu

championcakes.com

instanelson.com

appliedrestoxicol.com

thefamilybrew.com

lagunacrafts.com

aliferecovered.com

eastsolutions.website

theledgesashland.com

vkusomarket.com

Targets

    • Target

      14500.50.Deposit.exe

    • Size

      712KB

    • MD5

      93b2ca391610d14085551d30b9b4dba8

    • SHA1

      55e76c4988018dc93df899e2cda607418325910b

    • SHA256

      6bd5e5d02430922bfce2893c805028ae0374fee203235b379856f8bc5f574a76

    • SHA512

      c5f5f4a69885763a1fb620ff3aedc2abb76d648fe521c30bfdd9577e7e682c9343038db9ea640d6016813cab2c791a4caf1b2fc5bd24ae41cbfc1f70ba5f40a1

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

1
T1082

Tasks