General

  • Target

    Payment copy.exe

  • Size

    513KB

  • Sample

    211122-rk7f7saff6

  • MD5

    72057af1fd635831488188f01b91cff5

  • SHA1

    369ca3dd85f77d46b20beb415f25ed5aba81858e

  • SHA256

    105a4aaa48d95d20470f19e69f83066d09c1c0140ef5c2e13eab30afdc054668

  • SHA512

    ca2b72e22cf05a893d4d7c4c6a5759415e153da8b2fb27bec3915e04ade8cc49bbcf18f9ec37209368921ce3e91a3a966025f5db8093a7fa4324b83796380df4

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ea0r

C2

http://www.asiapubz-hk.com/ea0r/

Decoy

lionheartcreativestudios.com

konzertmanagement.com

blackpanther.online

broychim-int.com

takut18.com

txstarsolar.com

herdsherpa.com

igorshestakov.com

shinesbox.com

reflectpkljlt.xyz

oiltoolshub.com

viralmoneychallenge.com

changingalphastrategies.com

mecitiris.com

rdadmin.online

miniambiente.com

kominarcine.com

pino-almond.com

heihit.xyz

junqi888.com

Targets

    • Target

      Payment copy.exe

    • Size

      513KB

    • MD5

      72057af1fd635831488188f01b91cff5

    • SHA1

      369ca3dd85f77d46b20beb415f25ed5aba81858e

    • SHA256

      105a4aaa48d95d20470f19e69f83066d09c1c0140ef5c2e13eab30afdc054668

    • SHA512

      ca2b72e22cf05a893d4d7c4c6a5759415e153da8b2fb27bec3915e04ade8cc49bbcf18f9ec37209368921ce3e91a3a966025f5db8093a7fa4324b83796380df4

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

2
T1082

Tasks