General

  • Target

    Re_ New Order

  • Size

    1.6MB

  • Sample

    210901-np73jns2ss

  • MD5

    4ab3fc9e69b8c9e585f6a26704bad4a5

  • SHA1

    4eb3abbaf01b0c9ea550cd62cec749de79631754

  • SHA256

    950bca7263ec42c465df8d851c2f9ca3bd4244acb5240e6d36ef7db55dd91aac

  • SHA512

    1b594beb947053b5d6f8f69b8165de866edac10d41cfb8101c4d3a41bc4dea17b2c94fce4fb8d7f6e22ab62cd2be4166f6a4ed69b9c7d8513c866f8f704721ef

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

p086

C2

http://www.riscology.com/p086/

Decoy

jinshichain.com

worldpettraveler.com

hightecforpc.com

kj97fm.com

streetnewstv.com

webrew.club

wheretogodubai.com

apostapolitica.net

thecafy.com

vinelosangeles.com

gashinc.com

gutitout.net

bvd-invest.com

realtoroutdesk.com

lawnbowlstournaments.net

nobodyisillegal.com

abogadoorihuela.net

sanistela.com

jksecurityworld.com

peppermintproject.com

Targets

    • Target

      OR81530S.exe

    • Size

      636KB

    • MD5

      af331c3c0907af5282c00443536b22c7

    • SHA1

      ed908b4ad857a61bc9aa84bf8d53df894ee7bd5d

    • SHA256

      1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff

    • SHA512

      f00f1eb4df01061dd1bfec6c6df3e509359aa4a5acea5c91f5b9cd41e4bbf218d46a43b25d00922f86d1bbe99d090622e042cea1ce2184bd75d6f47b14fc7423

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks