General

  • Target

    4eb2be32690511a45844f521fa273dcb

  • Size

    842KB

  • Sample

    210819-mhmmyzfvza

  • MD5

    4eb2be32690511a45844f521fa273dcb

  • SHA1

    6aa45974c89398f0b1663231933aff412d8977ed

  • SHA256

    6e9ddd1d83e526efb6a597d46f95bfa07d09f2de7b4a71f2b99573cd45c924dd

  • SHA512

    cfddb820f2c525bdf686e19c3d11201028cd34388580ce2f0682327d874f25d467b1a50026c0ec291503b6e2df6338965e89ef3307e0271d92c3c1ae0ada38b9

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n8ba

C2

http://www.narrowpathwc.com/n8ba/

Decoy

thefitflect.com

anytourist.com

blggz.xyz

ascope.club

obyeboss.com

braun-mathematik.online

mtsnurulislamsby.com

jwpropertiestn.com

animalds.com

cunerier.com

sillysocklife.com

shopliyonamaaghin.net

theredcymbalsco.com

lostbikeproject.com

ryggoqlmga.club

realestatetriggers.com

luvlauricephotography.com

cheesehome.cloud

5fashionfix.net

wata-6-rwem.net

Targets

    • Target

      4eb2be32690511a45844f521fa273dcb

    • Size

      842KB

    • MD5

      4eb2be32690511a45844f521fa273dcb

    • SHA1

      6aa45974c89398f0b1663231933aff412d8977ed

    • SHA256

      6e9ddd1d83e526efb6a597d46f95bfa07d09f2de7b4a71f2b99573cd45c924dd

    • SHA512

      cfddb820f2c525bdf686e19c3d11201028cd34388580ce2f0682327d874f25d467b1a50026c0ec291503b6e2df6338965e89ef3307e0271d92c3c1ae0ada38b9

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks