General

  • Target

    PURCHASE ORDER.exe

  • Size

    469KB

  • Sample

    211120-ndrkmacfhr

  • MD5

    902c93a42ab9f3f1fbe967eeb1c33831

  • SHA1

    09d28ed373405e7ef3c62547bd5e4754ee497e01

  • SHA256

    1aac9a73533b5745a863e565e556ecc624619b3cecb917c9e8aee7b141976bb2

  • SHA512

    0c1c0d300ba544a5445f8a6c3587b60f7be3a249a4820f62c00d3625c56b0283555ecd502b2cb2116a4190ff1d81b4c86cc21700543307613a2a8842d5e1a3f7

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ea0r

C2

http://www.asiapubz-hk.com/ea0r/

Decoy

lionheartcreativestudios.com

konzertmanagement.com

blackpanther.online

broychim-int.com

takut18.com

txstarsolar.com

herdsherpa.com

igorshestakov.com

shinesbox.com

reflectpkljlt.xyz

oiltoolshub.com

viralmoneychallenge.com

changingalphastrategies.com

mecitiris.com

rdadmin.online

miniambiente.com

kominarcine.com

pino-almond.com

heihit.xyz

junqi888.com

Targets

    • Target

      PURCHASE ORDER.exe

    • Size

      469KB

    • MD5

      902c93a42ab9f3f1fbe967eeb1c33831

    • SHA1

      09d28ed373405e7ef3c62547bd5e4754ee497e01

    • SHA256

      1aac9a73533b5745a863e565e556ecc624619b3cecb917c9e8aee7b141976bb2

    • SHA512

      0c1c0d300ba544a5445f8a6c3587b60f7be3a249a4820f62c00d3625c56b0283555ecd502b2cb2116a4190ff1d81b4c86cc21700543307613a2a8842d5e1a3f7

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks