General

  • Target

    4.exe

  • Size

    256KB

  • Sample

    211022-lxl35sccgp

  • MD5

    29d0b6279f089be56d380d9c25e067e6

  • SHA1

    878937fc1ca21147f55cc5c2770cfba75c1de743

  • SHA256

    5273e82ad04676a987885f83791ae7fa779a6e72fd2608882ca4f1d2a1673ed2

  • SHA512

    a9d2c0c1de41a50106b382c45671b8fc03291790c74022da6f7b89b80b518f34a53a87c0f311ac2d89c59a87bdc056399fd24891760268c92ef74f3b59d36c7d

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

w240

C2

http://www.palisadesburgers.com/w240/

Decoy

deathgummys.com

accentuable.info

logisticairpetrelocators.com

playdropmats.com

ewshop.club

bislists.com

pkkjoo.net

goldenkaktus.com

bigspiderproductions.com

funessences.com

gimpydogproductions.com

motivatedmarketinggroup.com

bjadd.com

2ux3ms.com

zafzi.com

oldmanemailplan.xyz

quotexlibya.com

mobco.store

stofferogbo.kim

akidsguidetotheworld.com

Targets

    • Target

      4.exe

    • Size

      256KB

    • MD5

      29d0b6279f089be56d380d9c25e067e6

    • SHA1

      878937fc1ca21147f55cc5c2770cfba75c1de743

    • SHA256

      5273e82ad04676a987885f83791ae7fa779a6e72fd2608882ca4f1d2a1673ed2

    • SHA512

      a9d2c0c1de41a50106b382c45671b8fc03291790c74022da6f7b89b80b518f34a53a87c0f311ac2d89c59a87bdc056399fd24891760268c92ef74f3b59d36c7d

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks