General

  • Target

    05d6732ff73403961d2b131ac1237393

  • Size

    328KB

  • Sample

    211021-lq3sbaahgj

  • MD5

    05d6732ff73403961d2b131ac1237393

  • SHA1

    6bbfde0a9600bc7b5a5fdb04b2fb308d683b338d

  • SHA256

    d3a9a3edb7bf2c1c0bee319acb384b4ea0d27a72c09ee0781996ecc4b6637fef

  • SHA512

    1041901d78cd8345e665f4e81fa40e486eb4a762e28216e85755a08818fea1b593fa0053bef3aaf55df317675a02b2ce1f4f53cdaefcd10d4bc038baf253af09

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

bs8f

C2

http://www.rwilogisticsandbrokerage.com/bs8f/

Decoy

vasilnikov.com

parkate.club

pol360.com

handmadequatang.com

consult-set.com

nourkoki.com

theveganfusspot.com

dreamssail.com

pinpinyouqian.xyz

satellitphonestore.com

yotosunny.com

telosaolympics.com

gogetemm.com

yozotnpasumo2.xyz

avantgardemarket.com

glenndcp.com

dirtydriverz.com

avaui.com

anchoredtheblog.com

marianaoliveiraarquitetura.com

Targets

    • Target

      05d6732ff73403961d2b131ac1237393

    • Size

      328KB

    • MD5

      05d6732ff73403961d2b131ac1237393

    • SHA1

      6bbfde0a9600bc7b5a5fdb04b2fb308d683b338d

    • SHA256

      d3a9a3edb7bf2c1c0bee319acb384b4ea0d27a72c09ee0781996ecc4b6637fef

    • SHA512

      1041901d78cd8345e665f4e81fa40e486eb4a762e28216e85755a08818fea1b593fa0053bef3aaf55df317675a02b2ce1f4f53cdaefcd10d4bc038baf253af09

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

MITRE ATT&CK Matrix

Tasks