General

  • Target

    Payment Advice.gz.exe

  • Size

    370KB

  • Sample

    220119-pjxjhahffp

  • MD5

    5cda0b468d4136fb19e1f79c258acbb9

  • SHA1

    0cb7a1174cf5d5a7089c8ed585c5e670974b9048

  • SHA256

    fa5511f4b07ca39be9b04bee49a2b103cf827a207d316d4d41bad9cede43c9bc

  • SHA512

    e05c563a4caf8aa1def8febbe0042cd97b8b08ff2c6a69215610b321fb77132f6f9f6d804cba0d2cc060e7d81789d379475b03b107087555f717809f51784f44

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

be4o

Decoy

neonewway.club

kuanghong.club

7bkj.com

ooo-club.com

kamchatka-agency.com

sjsndtvitzru.mobi

noireimpactcollective.net

justbe-event.com

easypeasy.community

southcoast.glass

janhenningsen.com

jmxyjj.com

tarihibilet.com

nagradi7.com

percentrostered.net

certvaxid.com

kingseafoodsydney.com

blacksheepwalk.com

waktuk.com

inteligenciaenrefrigeracion.com

Targets

    • Target

      Payment Advice.gz.exe

    • Size

      370KB

    • MD5

      5cda0b468d4136fb19e1f79c258acbb9

    • SHA1

      0cb7a1174cf5d5a7089c8ed585c5e670974b9048

    • SHA256

      fa5511f4b07ca39be9b04bee49a2b103cf827a207d316d4d41bad9cede43c9bc

    • SHA512

      e05c563a4caf8aa1def8febbe0042cd97b8b08ff2c6a69215610b321fb77132f6f9f6d804cba0d2cc060e7d81789d379475b03b107087555f717809f51784f44

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks