General

  • Target

    Package Details.zip

  • Size

    342KB

  • Sample

    220119-z6sh6sdcfj

  • MD5

    42e6850c5886d58e8d82f3dcee402a08

  • SHA1

    aa7b9b58f426bb037add0e4d128665c5e1518497

  • SHA256

    6fa123be3ada8b13e9d35cdc7d9f89e6f3bcb5737ac26c7cff9072bb4f6a8403

  • SHA512

    c253f3f58e3936d2f7ad0bd65b258242e540a92a0fde75f0db35269fc66fe64cc79439d5524da94c845a64840babd36da6e3b6afa83099ffb1887f47e34659df

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

rexd

Decoy

xn--2es77o3w1bruk.mobi

cotesaintetienne.com

newlifefoursquaremcpherson.com

solutions-consulting.biz

chsico.com

demeet.xyz

eiruhguijire.store

realestatemoda.com

amr-fire.net

99v.one

altdaita.com

showerbeast.com

nsfone.com

doanhnhanvietnam.info

xn--transfpanou-39a.com

invitiz.com

chifaebio.xyz

footprint-farm.com

onlinenurseprograms.com

tigeratlspa.com

Targets

    • Target

      Package Details.exe

    • Size

      359KB

    • MD5

      4019522baa665679c9064aaaaae3f5e4

    • SHA1

      c7f7d7943a52d17d734ac36e34fcb3f1af91b625

    • SHA256

      9374f50165184534add26466aaab6275130e442387cae74b3c4461db85ed456a

    • SHA512

      1c9f6f04807d91792cfa3295c744b19762c76a1b5c8e710f3ff308ab85a9c95616257045872b2f9eef6976b0c9086cb5c72a0f7171faa050b7f92290688abb50

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks