General

  • Target

    tmp/femm.exe

  • Size

    327KB

  • Sample

    211214-pdnpeagfgp

  • MD5

    1fe6bb3b680c6b3efe92374bd5ea8b85

  • SHA1

    356c0cc6df02a6fa30705e918141186bd0c78475

  • SHA256

    a63e0773595f36b7ada59361abb3b0df6bf684188170da64325f7224265ecc62

  • SHA512

    a1c8cd4bf5527facfb859fb9b29c24f4f62246a17bbedfab52f09c9ef1f59c4ac57c03e776da67055dbfc3911e0e81ae36a5fb7158a2c55fb1d17ab9af6f5e41

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

C2

http://www.fis.photos/ef6c/

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      tmp/femm.exe

    • Size

      327KB

    • MD5

      1fe6bb3b680c6b3efe92374bd5ea8b85

    • SHA1

      356c0cc6df02a6fa30705e918141186bd0c78475

    • SHA256

      a63e0773595f36b7ada59361abb3b0df6bf684188170da64325f7224265ecc62

    • SHA512

      a1c8cd4bf5527facfb859fb9b29c24f4f62246a17bbedfab52f09c9ef1f59c4ac57c03e776da67055dbfc3911e0e81ae36a5fb7158a2c55fb1d17ab9af6f5e41

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks