General

  • Target

    Transfer advice.eml.exe

  • Size

    824KB

  • Sample

    210829-xcsswkpng2

  • MD5

    4637490ac52ef53fe5c0beb8c29a0725

  • SHA1

    4c4a4e5a04662a9df6f761c4acf7dc787536fe8a

  • SHA256

    80df303ae126ce28b9d4161060f164c1636c4b63dc02f7d2befdf6f45737ff12

  • SHA512

    0a9939dc24abe573e26d9552219844fe9e61c277979e3340126a1d3afba74eceb4e344ea7094dc835f9b048cd8635a0d1b9354aab4884a46bdcaedc16c70b46e

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

bp39

C2

http://www.piadineriae45.com/bp39/

Decoy

glembos.com

adjud.net

beautifyoils.com

chilewiki.com

duxingzi.com

happygromedia.com

restpostenboerse.com

vowsweddingofficiants.com

ladingjiwa.xyz

keepmakingefforts-001.com

yeniao.net

eyildirmaz.com

sayanghae.com

promoteboost.com

lzft.net

proudindiacompany.com

birchwoodmeridianlink.com

mesinionisasi.com

wwwrigalinks.com

wewearthepants.com

Targets

    • Target

      Transfer advice.eml.exe

    • Size

      824KB

    • MD5

      4637490ac52ef53fe5c0beb8c29a0725

    • SHA1

      4c4a4e5a04662a9df6f761c4acf7dc787536fe8a

    • SHA256

      80df303ae126ce28b9d4161060f164c1636c4b63dc02f7d2befdf6f45737ff12

    • SHA512

      0a9939dc24abe573e26d9552219844fe9e61c277979e3340126a1d3afba74eceb4e344ea7094dc835f9b048cd8635a0d1b9354aab4884a46bdcaedc16c70b46e

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks