General

  • Target

    T2812A.exe

  • Size

    380KB

  • Sample

    211029-n316cshhhj

  • MD5

    a18f3c54efed2e42168d6748a5c04c16

  • SHA1

    4aa01a7a9557d15ef251e1bd107ec821872549b1

  • SHA256

    724908fa2c546fad14d2a687c9f471f75548903b2d94fb903d617570cedaef7f

  • SHA512

    dcb020ff28a6d694a9c4e2eaf097413f4085f8f51663958defdbe465c1592e95a518063d2d401bae392363eacf1e4ab5a2e7993ac3f541fb8c4e4eb322ad6733

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

snec

C2

http://www.go2payme.com/snec/

Decoy

sacramentoscoop.com

auroraeqp.com

ontactfactory.com

abenakigroup.com

xander-tech.com

cocaineislegal.com

carbondouze.com

louisvilleestatelawyer.com

sundaytejero.quest

arti-faqs.com

thisandthat.store

biodyne-el-salvador.com

18504seheritageoakslane.com

mfialias.xyz

whitestoneclo.com

6288117.com

oficiosuy.com

autogift.xyz

wallbabyshell.com

chaletlabaie.com

Targets

    • Target

      T2812A.exe

    • Size

      380KB

    • MD5

      a18f3c54efed2e42168d6748a5c04c16

    • SHA1

      4aa01a7a9557d15ef251e1bd107ec821872549b1

    • SHA256

      724908fa2c546fad14d2a687c9f471f75548903b2d94fb903d617570cedaef7f

    • SHA512

      dcb020ff28a6d694a9c4e2eaf097413f4085f8f51663958defdbe465c1592e95a518063d2d401bae392363eacf1e4ab5a2e7993ac3f541fb8c4e4eb322ad6733

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks