General

  • Target

    Invoice-309-Ref-284.lzh

  • Size

    605KB

  • Sample

    210817-tp3g63wa82

  • MD5

    bfb92fc9b5c53f326d2169e552454f5f

  • SHA1

    311b90c1b2e7f7c98cc04e6cfa739f135320eed9

  • SHA256

    9640b32c7489c4b78f3e98dd19f1101b69dbba230ce531275af4873d1b42328a

  • SHA512

    b83778400e2c8e8b4555fa6918dd9c3ccd8d1677ce9e1ff4058133163dedd5372e83b01a6bb19da9b929b4e876d0ca017d0f3aff2834bd69235bf87c9ce7f175

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ipa8

C2

http://www.desarrollosolucionesnavarro.com/ipa8/

Decoy

royalposhpups.com

univa.world

lanerbo.com

shopbabygo.com

theutahhomestore.com

serialmixer.icu

linfeiya.com

xn--12cg3de5c2eb5cyi.com

am-conseil-communication.com

dailygame168.com

therightmilitia.com

visions-agency.com

mapopi.com

frugallyketo.com

guapandglo.com

54w-x126v.net

your-health-kick.com

blockchainhub360.com

registernowhd.xyz

votekellykitashima.com

Targets

    • Target

      Invoice-309-Ref-284.exe

    • Size

      947KB

    • MD5

      33d6b64658d6d65330aa45e745a07378

    • SHA1

      4aac1e207c9bbcd0959901557ed3da64b950a091

    • SHA256

      e6d6ba31c6a493196ef6147ee975e41970f069ce9abd2b114c115891be4d37e0

    • SHA512

      4b062d9c1cfab5d98812b999d61d94648219e61b6aef17d073321ad8c4681ed84e1fd78d776958acde24bcd39eb57006f42245d2eacc15bb34c3979fefd0cfa7

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

1
T1082

Tasks