General

  • Target

    6926a53fa91cab577d52942a39e5fb53

  • Size

    434KB

  • Sample

    211125-xx9pzsgdbm

  • MD5

    6926a53fa91cab577d52942a39e5fb53

  • SHA1

    c15dfc5e94ca97d47fd89dcdc42cc03888334c91

  • SHA256

    1ba605473b6fc3b244f25a8838e41a642dbf9566d347d3ea084e96bbe88aebde

  • SHA512

    02afc62ccf5c48dd3bfdc2e26eb3c6b997c65dc499d793568d04c3410b0a8961e9c7f738e7e43324d167460c6418ec911cc815a87158680d128d7f80455338fd

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ht08

C2

http://www.septemberstockevent200.com/ht08/

Decoy

joye.club

istanbulemlakgalerisi.online

annikadaniel.love

oooci.com

curebase-test.com

swisstradecenter.com

hacticum.com

centercodebase.com

recbi56ni.com

mmj0115.xyz

sharpstead.com

sprklbeauty.com

progettogenesi.cloud

dolinum.com

amaroqadvisors.com

traininig.com

leewaysvcs.com

nashhomesearch.com

joy1263.com

serkanyamac.com

Targets

    • Target

      6926a53fa91cab577d52942a39e5fb53

    • Size

      434KB

    • MD5

      6926a53fa91cab577d52942a39e5fb53

    • SHA1

      c15dfc5e94ca97d47fd89dcdc42cc03888334c91

    • SHA256

      1ba605473b6fc3b244f25a8838e41a642dbf9566d347d3ea084e96bbe88aebde

    • SHA512

      02afc62ccf5c48dd3bfdc2e26eb3c6b997c65dc499d793568d04c3410b0a8961e9c7f738e7e43324d167460c6418ec911cc815a87158680d128d7f80455338fd

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks