General

  • Target

    KONUgynwW37Tb1K.exe

  • Size

    398KB

  • Sample

    220117-wlbs5sbfb4

  • MD5

    bb040b47d2f6f564bb5fdb59ff610ced

  • SHA1

    ff31a2d5284d43b4f2ffd27594bddf8352db3149

  • SHA256

    425f5003a91d1ecced29d4e5a5746806d0b7d5d4a3833c13b88677a3c27eb0de

  • SHA512

    c91949fea00e5cdddbee1daf914b1806f2b458a3bde2842f90d0f43d4e3247b952f8780443c4cce50c4c42c07ec32b4f514c87b427eca3a323087556b2eb7721

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

cbgo

Decoy

tablescaperendezvous4two.net

abktransportllc.net

roseevision.com

skategrindingwheels.com

robux-generator-free.xyz

yacusi.com

mgav35.xyz

paravocecommerce.com

venkatramanrm.com

freakyhamster.com

jenaashoponline.com

dmozlisting.com

lorrainekclark.store

handyman-prime.com

thecrashingbrains.com

ukpms.com

livingstonemines.com

papeisonline.com

chrisbakerpr.com

omnipets.store

Targets

    • Target

      KONUgynwW37Tb1K.exe

    • Size

      398KB

    • MD5

      bb040b47d2f6f564bb5fdb59ff610ced

    • SHA1

      ff31a2d5284d43b4f2ffd27594bddf8352db3149

    • SHA256

      425f5003a91d1ecced29d4e5a5746806d0b7d5d4a3833c13b88677a3c27eb0de

    • SHA512

      c91949fea00e5cdddbee1daf914b1806f2b458a3bde2842f90d0f43d4e3247b952f8780443c4cce50c4c42c07ec32b4f514c87b427eca3a323087556b2eb7721

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks