General

  • Target

    DEC SOA_09012022.exe

  • Size

    373KB

  • Sample

    220110-hsnjmaecdl

  • MD5

    6046b2f34b67e06c817f4375c6d26a54

  • SHA1

    2230944a4216a07fde067866af7e81e1a52e8535

  • SHA256

    56d2b2837e2856b61ad276a3b52151851a79e366c22c03652caf2ad2b50623db

  • SHA512

    542a355b0b51c43d7462f255822401fcce56ba8a3c1f117a578f68c762cd329bf533667e8f6c1f56bad8ff71678954b59edec1da725b2a837bb401edcf94b2ac

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

igwa

Decoy

listingswithalex.com

funtabse.com

aydenwalling.com

prochal.net

superfoodsnederland.com

moldluck.com

dianekgordon.store

regionalhomescommercial.com

mysecuritymadesimple.com

malwaremastery.com

kodaikeiko.com

jrzg996.com

agricurve.net

songlingjiu.com

virginianundahfishingclub.com

friendschance.com

pastelpresents.com

answertitles.com

survival-hunter.com

nxfddl.com

Targets

    • Target

      DEC SOA_09012022.exe

    • Size

      373KB

    • MD5

      6046b2f34b67e06c817f4375c6d26a54

    • SHA1

      2230944a4216a07fde067866af7e81e1a52e8535

    • SHA256

      56d2b2837e2856b61ad276a3b52151851a79e366c22c03652caf2ad2b50623db

    • SHA512

      542a355b0b51c43d7462f255822401fcce56ba8a3c1f117a578f68c762cd329bf533667e8f6c1f56bad8ff71678954b59edec1da725b2a837bb401edcf94b2ac

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks