General

  • Target

    7.exe

  • Size

    164KB

  • Sample

    211008-hm4zesdeb4

  • MD5

    d5505bd41c64788074c8dc6fb0e68226

  • SHA1

    d0b5f1288fbd6f0e9844a6e06d3fe148ab9bd5dd

  • SHA256

    7c091c9ad6167399192bd97032c60267e78566353b6d25a84e40f823b56bcbe1

  • SHA512

    78c421545624fc4162e23b21558e584c352b882ee4d658f7b946a9812d067fa9ef28d4c7dd844ae81a3b7be697fb378a6ad476e41e94646586fdea3c39ceb5b1

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pvxz

C2

http://www.finetipster.com/pvxz/

Decoy

imt-token.club

abravewayocen.online

shcloudcar.com

mshoppingworld.online

ncgf08.xyz

stuinfo.xyz

wesavetheplanetofficial.com

tourbox.xyz

believeinyourselftraining.com

jsboyat.com

aaeconomy.info

9etmorea.info

purosepeti7.com

goticketly.com

pinkmemorypt.com

mylifewellnesscentre.com

iridina.online

petrestore.online

neema.xyz

novelfooditalia.com

Targets

    • Target

      7.exe

    • Size

      164KB

    • MD5

      d5505bd41c64788074c8dc6fb0e68226

    • SHA1

      d0b5f1288fbd6f0e9844a6e06d3fe148ab9bd5dd

    • SHA256

      7c091c9ad6167399192bd97032c60267e78566353b6d25a84e40f823b56bcbe1

    • SHA512

      78c421545624fc4162e23b21558e584c352b882ee4d658f7b946a9812d067fa9ef28d4c7dd844ae81a3b7be697fb378a6ad476e41e94646586fdea3c39ceb5b1

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks