General

  • Target

    SOA.exe

  • Size

    730KB

  • Sample

    211126-rf3x8agae4

  • MD5

    8ea5b64bdc789aef4eebd017fadd62e7

  • SHA1

    3777be0b638147b1fd8c3be0d15b7e336f40d519

  • SHA256

    7346f558f4e3b55028c7d199dcfed4eb1eac0f81f7962e700ff82ba22c7c428f

  • SHA512

    967dfc973cc80f45d4fd61714e524b0b7b0df884f69853e068fa016bdccfa3b4142164a78b189297be564af96c74da57a913ac0a763f5872a38acf5fe2da8b09

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ea0r

C2

http://www.asiapubz-hk.com/ea0r/

Decoy

lionheartcreativestudios.com

konzertmanagement.com

blackpanther.online

broychim-int.com

takut18.com

txstarsolar.com

herdsherpa.com

igorshestakov.com

shinesbox.com

reflectpkljlt.xyz

oiltoolshub.com

viralmoneychallenge.com

changingalphastrategies.com

mecitiris.com

rdadmin.online

miniambiente.com

kominarcine.com

pino-almond.com

heihit.xyz

junqi888.com

Targets

    • Target

      SOA.exe

    • Size

      730KB

    • MD5

      8ea5b64bdc789aef4eebd017fadd62e7

    • SHA1

      3777be0b638147b1fd8c3be0d15b7e336f40d519

    • SHA256

      7346f558f4e3b55028c7d199dcfed4eb1eac0f81f7962e700ff82ba22c7c428f

    • SHA512

      967dfc973cc80f45d4fd61714e524b0b7b0df884f69853e068fa016bdccfa3b4142164a78b189297be564af96c74da57a913ac0a763f5872a38acf5fe2da8b09

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks