General

  • Target

    c01d5c630294241db988b68176f2d00f

  • Size

    473KB

  • Sample

    211123-m4kdkadaa2

  • MD5

    c01d5c630294241db988b68176f2d00f

  • SHA1

    2f53b05dcc5b3d5b13457f7452c4626f647fb887

  • SHA256

    e65d1335f3495f7d469bea81683253ee0845b3b3980cfaea09c4a7837a6c66eb

  • SHA512

    144d9633b19611a98af9858a8a6868fd3e023821de9d221428b9d91ebff83a1a3e6c97c3c8b4c22baff610e56ce641787d49fe65cffec973a140fef44a3f6c5a

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

C2

http://www.fis.photos/ef6c/

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      c01d5c630294241db988b68176f2d00f

    • Size

      473KB

    • MD5

      c01d5c630294241db988b68176f2d00f

    • SHA1

      2f53b05dcc5b3d5b13457f7452c4626f647fb887

    • SHA256

      e65d1335f3495f7d469bea81683253ee0845b3b3980cfaea09c4a7837a6c66eb

    • SHA512

      144d9633b19611a98af9858a8a6868fd3e023821de9d221428b9d91ebff83a1a3e6c97c3c8b4c22baff610e56ce641787d49fe65cffec973a140fef44a3f6c5a

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks