General

  • Target

    d7dc43fd6d64d75b9cf206ee3960055bc4f5b5db2ad0e7902eb2cef32c7d9e8c

  • Size

    421KB

  • Sample

    220114-a8xs8sdec2

  • MD5

    b04341cdd8fcb8aacd379147601df24b

  • SHA1

    81c880a09e94267ee6c65c239d80d0b853828cd7

  • SHA256

    d7dc43fd6d64d75b9cf206ee3960055bc4f5b5db2ad0e7902eb2cef32c7d9e8c

  • SHA512

    434c912533ea9c41971ff15325ead2d14b5171368640b8563f846387897944845f273451c2bb131a4baf0bde862c8dda487a346004a66d91ed1c4fd00b7ce438

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pnug

Decoy

natureate.com

ita-pots.website

sucohansmushroom.com

produrielrosen.com

gosystemupdatenow.online

jiskra.art

janwiench.com

norfolkfoodhall.com

iloveaddictss.com

pogozip.com

buyinstapva.com

teardirectionfreedom.xyz

0205168.com

apaixonadosporpugs.online

jawscoinc.com

crafter.quest

wikipedianow.com

radiopuls.net

kendama-co.com

goodstudycanada.com

Targets

    • Target

      d7dc43fd6d64d75b9cf206ee3960055bc4f5b5db2ad0e7902eb2cef32c7d9e8c

    • Size

      421KB

    • MD5

      b04341cdd8fcb8aacd379147601df24b

    • SHA1

      81c880a09e94267ee6c65c239d80d0b853828cd7

    • SHA256

      d7dc43fd6d64d75b9cf206ee3960055bc4f5b5db2ad0e7902eb2cef32c7d9e8c

    • SHA512

      434c912533ea9c41971ff15325ead2d14b5171368640b8563f846387897944845f273451c2bb131a4baf0bde862c8dda487a346004a66d91ed1c4fd00b7ce438

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks