General

  • Target

    6316684147851264.zip

  • Size

    625KB

  • Sample

    220118-gq2g2ahhgj

  • MD5

    d91336c9ffd0916264f8bf6b3e2a17b5

  • SHA1

    88439afa8b09f9d62d710f8095f936b6105ba7f6

  • SHA256

    1456b8338fa5a0d243dc211aa6969eb72cc24c90d74968d7296b93028df6a23b

  • SHA512

    8ee7939828d9013c26ec18323f30b86282992fd693917a03e0676bcc75a26b37b8a6fd4c0258542ed8a16343f61e3a89547669c2b157524b4d54add8d43574b2

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      e6fc8bbf9d585429d28269af4f4626388f2451f57f714797dcdaee31f0b089f9

    • Size

      713KB

    • MD5

      add4d57c8018f168bbbc385529324a54

    • SHA1

      16393725306391ff0a9ee034e87655f3819bab60

    • SHA256

      e6fc8bbf9d585429d28269af4f4626388f2451f57f714797dcdaee31f0b089f9

    • SHA512

      1021a5da690d129fb40ac8f022edf2cc4e73d13824d9db04467022c91d6d3ee39dca911f03391b1b40a00a83957e4bca7ca1d7a3faeb7a6b88bab3330c804a32

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks