General

  • Target

    Shipping_Doc190dk0lwt837.exe

  • Size

    249KB

  • Sample

    211022-fvblqscael

  • MD5

    2d0ac0a8f2d2aea1f05429585c1bdc4c

  • SHA1

    3657594459b01c0c918e0deeaf3ad7f05a4efd90

  • SHA256

    f1d7ead1ca0f3e39c12bf5b67bb35cfc745acf0f587c2d6ce45eb2904f44aaa7

  • SHA512

    863b35e33b0b09aece9268c83ca3411180c23463a01e6b93744b978199c7fc386ecaddf0776588be59bcf41b46f4584e7405a17f1ee3cc64df602655036f92e7

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

u5eh

C2

http://www.retonamoss.com/u5eh/

Decoy

tryafaq.com

bobcathntshop.com

oglead.com

026skz.xyz

brasbux.com

adna17.com

noveltyrofjiy.xyz

realestatecompanys.com

leman-web.com

df5686.com

jonathonhawkins.com

juliedominyfloralartistry.com

classyeventsco.com

aquaticatt.com

iotworld.xyz

hoc8.com

disposablediapers.store

peregovorim.online

advancebits.club

getaburialplan.com

Targets

    • Target

      Shipping_Doc190dk0lwt837.exe

    • Size

      249KB

    • MD5

      2d0ac0a8f2d2aea1f05429585c1bdc4c

    • SHA1

      3657594459b01c0c918e0deeaf3ad7f05a4efd90

    • SHA256

      f1d7ead1ca0f3e39c12bf5b67bb35cfc745acf0f587c2d6ce45eb2904f44aaa7

    • SHA512

      863b35e33b0b09aece9268c83ca3411180c23463a01e6b93744b978199c7fc386ecaddf0776588be59bcf41b46f4584e7405a17f1ee3cc64df602655036f92e7

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks