General

  • Target

    tmp/dfcae1cb-68ea-4a4b-bdf3-c951a687982a_vbc.exe

  • Size

    359KB

  • Sample

    211220-vh2pqacagq

  • MD5

    09d20093b28ef892d0a7d3d6a3f09574

  • SHA1

    05b357f88e60c31cfa3f4752d0f70dd66aa367b0

  • SHA256

    ca63aeb4d3c007faf34aaba889aa142c87642594b5aa6bcac41a2e4aa1c4c807

  • SHA512

    19fa0692cedb7f16e1fec497b77be0dd36d22b7f13ce380ddc492075ae69563ee139567fc93c2ceef469893c6d1a0df90863859c128f6de29ce7c1c21f1f5eb7

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fqiq

Decoy

driventow.com

ipatchwork.today

bolder.equipment

seal-brother.com

mountlaketerraceapartments.com

weeden.xyz

sanlifalan.com

athafood.com

isshinn1.com

creationslazzaroni.com

eclecticrenaissancewoman.com

satellitephonstore.com

cotchildcare.com

yamacorp.digital

ff4cuno43.xyz

quicksticks.community

govindfinance.com

farmersfirstseed.com

megacinema.club

tablescaperendezvous4two.com

Targets

    • Target

      tmp/dfcae1cb-68ea-4a4b-bdf3-c951a687982a_vbc.exe

    • Size

      359KB

    • MD5

      09d20093b28ef892d0a7d3d6a3f09574

    • SHA1

      05b357f88e60c31cfa3f4752d0f70dd66aa367b0

    • SHA256

      ca63aeb4d3c007faf34aaba889aa142c87642594b5aa6bcac41a2e4aa1c4c807

    • SHA512

      19fa0692cedb7f16e1fec497b77be0dd36d22b7f13ce380ddc492075ae69563ee139567fc93c2ceef469893c6d1a0df90863859c128f6de29ce7c1c21f1f5eb7

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks