General

  • Target

    Inv_7623980.r15

  • Size

    462KB

  • Sample

    210727-fvlkph8qve

  • MD5

    7390d6d45152e7410b00e7016c176e88

  • SHA1

    60aa33cf23d58b88d5489761c90ef641a88ef7f8

  • SHA256

    52ba394876871545b58db9c8a0303fc3bfbb353cc4de1abdd1d2d51122b16fe9

  • SHA512

    6f5ae649d0f34573d685dc38242d6b9970ec7ddf9682927c674c9bb893f17463c96d711b185ec3b0e1ac5e3dac04a1bb93aff7f60766774e4de593679c9d605c

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.inverservi.com/m6b5/

Decoy

ixtarbelize.com

pheamal.com

daiyncc.com

staydoubted.com

laagerlitigation.club

sukrantastansakarya.com

esupport.ltd

vetscontracting.net

themuslimlife.coach

salmanairs.com

somatictherapyservices.com

lastminuteminister.com

comunicarbuenosaires.com

kazuya.tech

insightlyservicedev.com

redevelopment38subhashnagar.com

thefutureinvestor.com

simplysu.com

lagu45.com

livingstonpistolpermit.com

Targets

    • Target

      Inv_7623980.exe

    • Size

      1.1MB

    • MD5

      24de383154bbdc31b305fd25a3ee95db

    • SHA1

      7d3be8631affd24746beeec725b4ad0d518805b8

    • SHA256

      790898f9518c146e7ffa430b975ee0f5bc162b6b5a5dba008e0572741312bc19

    • SHA512

      7dee6bb2ca1996706c59cab95575200b3273bc2e110d9514527d8b5cda4d33bb65a9bf12a7c015568e16a8646cbd5e7df0f71321708ed60de884822cc4855090

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks