General

  • Target

    602c4326ca0aa0a007b10241d7dae3fdbef7705e14231ba85e8635578cfdb0d4

  • Size

    324KB

  • Sample

    211103-hzf35aaeak

  • MD5

    36ca5751b0b2d9321215f223a18aefbf

  • SHA1

    c9661ff48f2eaa2718a46b23a70a02a8461715be

  • SHA256

    602c4326ca0aa0a007b10241d7dae3fdbef7705e14231ba85e8635578cfdb0d4

  • SHA512

    f698c83167eda1832e90eeed65d39883b6515c0f6c718e3ce6d517e6d230bab14b15a920f90979a2cf55c601688819deec0de2b47278a032103a22fd2fe2774c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ga6b

C2

http://www.egyptian-museum.com/ga6b/

Decoy

diasporacospices.com

sd-shenghe.com

onlinewritingjobs.net

greenstreamgroup.store

garageair.agency

idh-bf.com

middenhavendambreskens.com

szkoleniawcag.online

wiremefeelings.com

ottosperformance.com

brothermush.com

weiserpath.com

baohiemtv24h.com

glassgalaxynft.com

spiritualmind.space

18130072012.com

3v0.space

smartgadgetscompare.com

corvusexpeditii.xyz

egcontabilidade.website

Targets

    • Target

      602c4326ca0aa0a007b10241d7dae3fdbef7705e14231ba85e8635578cfdb0d4

    • Size

      324KB

    • MD5

      36ca5751b0b2d9321215f223a18aefbf

    • SHA1

      c9661ff48f2eaa2718a46b23a70a02a8461715be

    • SHA256

      602c4326ca0aa0a007b10241d7dae3fdbef7705e14231ba85e8635578cfdb0d4

    • SHA512

      f698c83167eda1832e90eeed65d39883b6515c0f6c718e3ce6d517e6d230bab14b15a920f90979a2cf55c601688819deec0de2b47278a032103a22fd2fe2774c

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks