General

  • Target

    DH146890Y.exe

  • Size

    256KB

  • Sample

    211029-nqzf1ahheq

  • MD5

    acaef58b0bb5cb7965052d41570b5686

  • SHA1

    1668c7470fe1c5d9330f66267d987b0e08b0f8ad

  • SHA256

    4c382fc031bb1ca0e9e075fe60ec6ce335050799c3ebff9fea3bd1531f2aceae

  • SHA512

    cf843e25a0c707bc0070913b2b240fb5818de2daefd1c76798b3538fbefb9da0b08bdbf58764c463385eb4876556b85c83b73643098bbffd32ac6b95bd8f4da6

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

u5eh

C2

http://www.retonamoss.com/u5eh/

Decoy

tryafaq.com

bobcathntshop.com

oglead.com

026skz.xyz

brasbux.com

adna17.com

noveltyrofjiy.xyz

realestatecompanys.com

leman-web.com

df5686.com

jonathonhawkins.com

juliedominyfloralartistry.com

classyeventsco.com

aquaticatt.com

iotworld.xyz

hoc8.com

disposablediapers.store

peregovorim.online

advancebits.club

getaburialplan.com

Targets

    • Target

      DH146890Y.exe

    • Size

      256KB

    • MD5

      acaef58b0bb5cb7965052d41570b5686

    • SHA1

      1668c7470fe1c5d9330f66267d987b0e08b0f8ad

    • SHA256

      4c382fc031bb1ca0e9e075fe60ec6ce335050799c3ebff9fea3bd1531f2aceae

    • SHA512

      cf843e25a0c707bc0070913b2b240fb5818de2daefd1c76798b3538fbefb9da0b08bdbf58764c463385eb4876556b85c83b73643098bbffd32ac6b95bd8f4da6

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks