General

  • Target

    fdbfac3db38e579f28f6a51e55e7b01b

  • Size

    831KB

  • Sample

    210823-w8cqmpl2ve

  • MD5

    fdbfac3db38e579f28f6a51e55e7b01b

  • SHA1

    88e11b109d1f9e6e4be019561ab6429e4ad838ad

  • SHA256

    7854503f3fc57a985d64d1b24fe2517497f6ec23338156a25a77dc5c0e7c6e17

  • SHA512

    249af205b79510db4e10bcb3d8d0419af5a7005b6c66810e4d9221ba7bc44e600f1ed087d991a91b6eb70c85209e9770ad6051fe83b61a3a96f06ad58f4f352a

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n8ba

C2

http://www.narrowpathwc.com/n8ba/

Decoy

thefitflect.com

anytourist.com

blggz.xyz

ascope.club

obyeboss.com

braun-mathematik.online

mtsnurulislamsby.com

jwpropertiestn.com

animalds.com

cunerier.com

sillysocklife.com

shopliyonamaaghin.net

theredcymbalsco.com

lostbikeproject.com

ryggoqlmga.club

realestatetriggers.com

luvlauricephotography.com

cheesehome.cloud

5fashionfix.net

wata-6-rwem.net

Targets

    • Target

      fdbfac3db38e579f28f6a51e55e7b01b

    • Size

      831KB

    • MD5

      fdbfac3db38e579f28f6a51e55e7b01b

    • SHA1

      88e11b109d1f9e6e4be019561ab6429e4ad838ad

    • SHA256

      7854503f3fc57a985d64d1b24fe2517497f6ec23338156a25a77dc5c0e7c6e17

    • SHA512

      249af205b79510db4e10bcb3d8d0419af5a7005b6c66810e4d9221ba7bc44e600f1ed087d991a91b6eb70c85209e9770ad6051fe83b61a3a96f06ad58f4f352a

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks