General

  • Target

    mon.exe

  • Size

    347KB

  • Sample

    211020-m9kxaahhbl

  • MD5

    76a3c8abd4c17f3f0230a8d0f3df9603

  • SHA1

    9d51af2520755e41204357981a66b495c02ef959

  • SHA256

    ceb71d4b372e1a7b2a14d70c5032553454cd1712c0fe8d6dc0d3bba2cb5ed56c

  • SHA512

    0a24ce8c22f95cf6d2771fc28f2563fc61edc54a237573444f852b4b052015df98e3439e263bb36250777e1cd82234107564e1bcc85cf91183379cedd62e201b

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

C2

http://www.fis.photos/ef6c/

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      mon.exe

    • Size

      347KB

    • MD5

      76a3c8abd4c17f3f0230a8d0f3df9603

    • SHA1

      9d51af2520755e41204357981a66b495c02ef959

    • SHA256

      ceb71d4b372e1a7b2a14d70c5032553454cd1712c0fe8d6dc0d3bba2cb5ed56c

    • SHA512

      0a24ce8c22f95cf6d2771fc28f2563fc61edc54a237573444f852b4b052015df98e3439e263bb36250777e1cd82234107564e1bcc85cf91183379cedd62e201b

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks