General

  • Target

    NEW ORDER.exe

  • Size

    205KB

  • Sample

    210506-apwwwq9lta

  • MD5

    51e414df61a38f968f3469b87b55a007

  • SHA1

    81e101222f03e27d1e627b36daf2bcf5cfd478ff

  • SHA256

    3acd86ada75ac819a4374720b7e4dfbf270974237f9e7794c7cc51d510a9bff9

  • SHA512

    fbd6043b5bc059431943e3da68ec25e5a6ef5ecd88feb1703cd395dc33ab3da5e5eb1076577e4f9a969048c7c373e0bd395c293fee708007f61167f8c54c79d4

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.onyxcomputing.com/u8nw/

Decoy

constructionjadams.com

organicwellnessfarm.com

beautiful.tours

medvows.com

foxparanormal.com

fsmxmc.com

graniterealestategroup.net

qgi1.com

astrologicsolutions.com

rafbar.com

bastiontools.net

emotist.com

stacyleets.com

bloodtypealpha.com

healtybenenfitsplus.com

vavadadoa3.com

chefbenhk.com

dotgz.com

xn--z4qm188e645c.com

ethyi.com

Targets

    • Target

      NEW ORDER.exe

    • Size

      205KB

    • MD5

      51e414df61a38f968f3469b87b55a007

    • SHA1

      81e101222f03e27d1e627b36daf2bcf5cfd478ff

    • SHA256

      3acd86ada75ac819a4374720b7e4dfbf270974237f9e7794c7cc51d510a9bff9

    • SHA512

      fbd6043b5bc059431943e3da68ec25e5a6ef5ecd88feb1703cd395dc33ab3da5e5eb1076577e4f9a969048c7c373e0bd395c293fee708007f61167f8c54c79d4

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks