General

  • Target

    1fc33c4cccbeac1f2a0a7a4145ab2248848d349ec89f0594a564aa6ef7704a89

  • Size

    1.1MB

  • Sample

    211108-lg49saghcj

  • MD5

    5ecf66273f0e0a3755cc65792c0379dc

  • SHA1

    9d454f731800e3be76b013b988e894c941a70a15

  • SHA256

    1fc33c4cccbeac1f2a0a7a4145ab2248848d349ec89f0594a564aa6ef7704a89

  • SHA512

    2348b9367f5c1cec068d82f055d6fe3c019ba15f024c78556ec0c6b105b5c972f96279b73334f75fa225d8e4fc80eb292f8cba35212cdd36342d85825748b31a

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

e4nr

C2

http://www.rizkhr.com/e4nr/

Decoy

mklab.ltd

doabodrum.com

hospitalitysupply.xyz

iamcrypto.pink

studiodesignguru.com

hackersfullmoonartconcepts.com

nutritioustooth.com

cuzanservice.com

het9a.online

datenigthmovies.com

realitytv.xyz

eaglesflair.com

unheavymetal.com

acustomcollective.art

fifthbelle.com

backupplan.xyz

moirechi.online

bot-hack.com

fithefly.com

aonoti.com

Targets

    • Target

      1fc33c4cccbeac1f2a0a7a4145ab2248848d349ec89f0594a564aa6ef7704a89

    • Size

      1.1MB

    • MD5

      5ecf66273f0e0a3755cc65792c0379dc

    • SHA1

      9d454f731800e3be76b013b988e894c941a70a15

    • SHA256

      1fc33c4cccbeac1f2a0a7a4145ab2248848d349ec89f0594a564aa6ef7704a89

    • SHA512

      2348b9367f5c1cec068d82f055d6fe3c019ba15f024c78556ec0c6b105b5c972f96279b73334f75fa225d8e4fc80eb292f8cba35212cdd36342d85825748b31a

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks