General

  • Target

    SOA.exe

  • Size

    258KB

  • Sample

    211027-crangsabcm

  • MD5

    9d806c39777c5c9fda47905df48b8851

  • SHA1

    01bf9dbf205e2197f67d7a5b2eaf60f20d6785a1

  • SHA256

    d9cee5cc1ff9b14e0c1604dfded72f085e39b1983c41b595660a60bfaab942b9

  • SHA512

    0370634be0031d3b74bfdd772353d71afbdb5bfb7b8c4cba2bf34c355b6850202fb7f69c92ec6d625e18332effdad794a249ce89e71980908f0cd4c890311460

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

b2c0

C2

http://www.thesewhitevvalls.com/b2c0/

Decoy

bjyxszd520.xyz

hsvfingerprinting.com

elliotpioneer.com

bf396.com

chinaopedia.com

6233v.com

shopeuphoricapparel.com

loccssol.store

truefictionpictures.com

playstarexch.com

peruviancoffee.store

shobhajoshi.com

philme.net

avito-rules.com

independencehomecenters.com

atp-cayenne.com

invetorsbank.com

sasanos.com

scentfreebnb.com

catfuid.com

Targets

    • Target

      SOA.exe

    • Size

      258KB

    • MD5

      9d806c39777c5c9fda47905df48b8851

    • SHA1

      01bf9dbf205e2197f67d7a5b2eaf60f20d6785a1

    • SHA256

      d9cee5cc1ff9b14e0c1604dfded72f085e39b1983c41b595660a60bfaab942b9

    • SHA512

      0370634be0031d3b74bfdd772353d71afbdb5bfb7b8c4cba2bf34c355b6850202fb7f69c92ec6d625e18332effdad794a249ce89e71980908f0cd4c890311460

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks