General

  • Target

    add4d57c8018f168bbbc385529324a54

  • Size

    713KB

  • Sample

    220112-l43dpscccj

  • MD5

    add4d57c8018f168bbbc385529324a54

  • SHA1

    16393725306391ff0a9ee034e87655f3819bab60

  • SHA256

    e6fc8bbf9d585429d28269af4f4626388f2451f57f714797dcdaee31f0b089f9

  • SHA512

    1021a5da690d129fb40ac8f022edf2cc4e73d13824d9db04467022c91d6d3ee39dca911f03391b1b40a00a83957e4bca7ca1d7a3faeb7a6b88bab3330c804a32

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      add4d57c8018f168bbbc385529324a54

    • Size

      713KB

    • MD5

      add4d57c8018f168bbbc385529324a54

    • SHA1

      16393725306391ff0a9ee034e87655f3819bab60

    • SHA256

      e6fc8bbf9d585429d28269af4f4626388f2451f57f714797dcdaee31f0b089f9

    • SHA512

      1021a5da690d129fb40ac8f022edf2cc4e73d13824d9db04467022c91d6d3ee39dca911f03391b1b40a00a83957e4bca7ca1d7a3faeb7a6b88bab3330c804a32

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks