General

  • Target

    PO.10032021.exe

  • Size

    830KB

  • Sample

    211004-qykc6agde2

  • MD5

    4ba87f01d518f5b660cc487d488dbf3b

  • SHA1

    48ac926df1e641b32935f095523140701d5013c6

  • SHA256

    fbaf103427e20432a3dcf19733b5f447bb6f0b2e5c700c76df55c2d977d080ae

  • SHA512

    8621c3a2cbb7632a47d1b566e80eae51ad91e037fc49c715d1dc255ced2715791e3b4069d83cb3d6c856e4257674f1775dfb0e48bbd844862b9d7ea59f702547

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pvxz

C2

http://www.finetipster.com/pvxz/

Decoy

imt-token.club

abravewayocen.online

shcloudcar.com

mshoppingworld.online

ncgf08.xyz

stuinfo.xyz

wesavetheplanetofficial.com

tourbox.xyz

believeinyourselftraining.com

jsboyat.com

aaeconomy.info

9etmorea.info

purosepeti7.com

goticketly.com

pinkmemorypt.com

mylifewellnesscentre.com

iridina.online

petrestore.online

neema.xyz

novelfooditalia.com

Targets

    • Target

      PO.10032021.exe

    • Size

      830KB

    • MD5

      4ba87f01d518f5b660cc487d488dbf3b

    • SHA1

      48ac926df1e641b32935f095523140701d5013c6

    • SHA256

      fbaf103427e20432a3dcf19733b5f447bb6f0b2e5c700c76df55c2d977d080ae

    • SHA512

      8621c3a2cbb7632a47d1b566e80eae51ad91e037fc49c715d1dc255ced2715791e3b4069d83cb3d6c856e4257674f1775dfb0e48bbd844862b9d7ea59f702547

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks