General

  • Target

    b1e98b432deb419643d81c167fe0dc37

  • Size

    253KB

  • Sample

    211020-hgcyrahfeq

  • MD5

    b1e98b432deb419643d81c167fe0dc37

  • SHA1

    305c82fcc0699859e9fe11cc08f8678e23779a3e

  • SHA256

    da0e2504009a426b799d9135979188e2c4533f69c2e981650afc51d5e8e320c2

  • SHA512

    440e0429a4bb817b7ca9bb91f722b6678a6e443a0239a1a859e0de9d8d76f78a4a3c47b2a89b0340f97a9015d852b070788ae1fcc7e0b819115b45c702d661ed

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mxnu

C2

http://www.naplesconciergerealty.com/mxnu/

Decoy

insightmyhome.com

gabriellamaxey.com

029atk.xyz

marshconstructions.com

technichoffghosts.com

blue-ivy-boutique-au.com

1sunsetgroup.com

elfkuhnispb.store

caoliudh.club

verifiedpaypal.net

jellyice-tr.com

gatescres.com

bloomberq.online

crystaltopagent.net

uggs-line.com

ecommerceplatform.xyz

historyofcambridge.com

sattaking-gaziabad.xyz

digisor.com

beachpawsmobilegrooming.com

Targets

    • Target

      b1e98b432deb419643d81c167fe0dc37

    • Size

      253KB

    • MD5

      b1e98b432deb419643d81c167fe0dc37

    • SHA1

      305c82fcc0699859e9fe11cc08f8678e23779a3e

    • SHA256

      da0e2504009a426b799d9135979188e2c4533f69c2e981650afc51d5e8e320c2

    • SHA512

      440e0429a4bb817b7ca9bb91f722b6678a6e443a0239a1a859e0de9d8d76f78a4a3c47b2a89b0340f97a9015d852b070788ae1fcc7e0b819115b45c702d661ed

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks