General

  • Target

    Payment Confirmation.exe

  • Size

    445KB

  • Sample

    211013-rmdlxaebbm

  • MD5

    98ffc3c812e6cec919ebd286973e2002

  • SHA1

    b0d1a65445a7923870ad23ec4d80f592e808c987

  • SHA256

    014d0ece0d472eaea73698d634308303ddb9f227f39d339a66416c3cb744d2c1

  • SHA512

    5875f8f2c736cbf501c25635f5c9014e499a7fce01f139315cbf5c0d3c45e1e8568a9fa8ddfe60cb0a44804a7677fdcd411eab4be6177926649b1b691d97a721

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

b2c0

C2

http://www.thesewhitevvalls.com/b2c0/

Decoy

bjyxszd520.xyz

hsvfingerprinting.com

elliotpioneer.com

bf396.com

chinaopedia.com

6233v.com

shopeuphoricapparel.com

loccssol.store

truefictionpictures.com

playstarexch.com

peruviancoffee.store

shobhajoshi.com

philme.net

avito-rules.com

independencehomecenters.com

atp-cayenne.com

invetorsbank.com

sasanos.com

scentfreebnb.com

catfuid.com

Targets

    • Target

      Payment Confirmation.exe

    • Size

      445KB

    • MD5

      98ffc3c812e6cec919ebd286973e2002

    • SHA1

      b0d1a65445a7923870ad23ec4d80f592e808c987

    • SHA256

      014d0ece0d472eaea73698d634308303ddb9f227f39d339a66416c3cb744d2c1

    • SHA512

      5875f8f2c736cbf501c25635f5c9014e499a7fce01f139315cbf5c0d3c45e1e8568a9fa8ddfe60cb0a44804a7677fdcd411eab4be6177926649b1b691d97a721

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

2
T1082

Tasks