General

  • Target

    raw.exe

  • Size

    224KB

  • Sample

    210824-4a69rtngmn

  • MD5

    f5fa2e043b901e50f0e6e8ad0e4f7074

  • SHA1

    221c67c606a3a2e0c5bfa8b57d7c749e29b074d8

  • SHA256

    4938b1c8ca1745b33ea6adc31b39e2003646370ec7f52fe1e89af6903a69aaca

  • SHA512

    3d779d6b1ee667a27cf124d41397496620920a7e0544f8fe143e2ab6170148f2c9d6a0f05cef2528827cde20d03c99407d06f4e9a39db13bcb8984ab73ce7dd6

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

mabs

C2

http://www.heehan.com/mabs/

Decoy

joiderqm.com

hyc306.com

ouchplus.asia

abrosnm3.com

hospitalanti-infectives.com

ala-co.com

morrisonltts.net

tradingimpulse.com

invisibleimagination.com

jdjshop.com

huntedby.com

szsgfdzx.com

germfightersusaiowa.com

pahaadpost.com

obrankers.com

plaeralum.com

getfitwithmeministry.com

smartswaploan.com

gypsyjewelrydesigns.com

meetgoodwill.info

Targets

    • Target

      raw.exe

    • Size

      224KB

    • MD5

      f5fa2e043b901e50f0e6e8ad0e4f7074

    • SHA1

      221c67c606a3a2e0c5bfa8b57d7c749e29b074d8

    • SHA256

      4938b1c8ca1745b33ea6adc31b39e2003646370ec7f52fe1e89af6903a69aaca

    • SHA512

      3d779d6b1ee667a27cf124d41397496620920a7e0544f8fe143e2ab6170148f2c9d6a0f05cef2528827cde20d03c99407d06f4e9a39db13bcb8984ab73ce7dd6

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks