General

  • Target

    c7eeea84c68c73b96a2bc816b9738ca8c9c2abe93f7705ec07f8d1205422d86e

  • Size

    279KB

  • Sample

    220120-11ekssbhgl

  • MD5

    c0b3e89e6ae15becdebd353a165b61ac

  • SHA1

    276eead9497fdfddd51259240b69008cca8ce7a1

  • SHA256

    c7eeea84c68c73b96a2bc816b9738ca8c9c2abe93f7705ec07f8d1205422d86e

  • SHA512

    9ff47712d6cdbcf75ec06d12b1a021d53e474bd2888bec0e7eed1a7d59370f8ddb087ccf19e983e86c1aa28f77df3927dd1124c1a55233bb3fc7f024a2446c6e

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

jdo2

Decoy

adopte-un-per.com

lmandarin.com

shonemurawni.quest

bantasis.com

jsdigitalekuns.net

hiddenroom.net

arungjerampangalengan.com

yinghongxw.com

buzzcupid.com

lattent.digital

faxtoemailguide.com

romanticfriryrose.com

ruleaou.com

mochiko-blog.com

sekireixploit.com

bcx-wiremesh.com

jobportalsg.com

wysspirit.com

iflycny.com

sh-cy17.com

Targets

    • Target

      c7eeea84c68c73b96a2bc816b9738ca8c9c2abe93f7705ec07f8d1205422d86e

    • Size

      279KB

    • MD5

      c0b3e89e6ae15becdebd353a165b61ac

    • SHA1

      276eead9497fdfddd51259240b69008cca8ce7a1

    • SHA256

      c7eeea84c68c73b96a2bc816b9738ca8c9c2abe93f7705ec07f8d1205422d86e

    • SHA512

      9ff47712d6cdbcf75ec06d12b1a021d53e474bd2888bec0e7eed1a7d59370f8ddb087ccf19e983e86c1aa28f77df3927dd1124c1a55233bb3fc7f024a2446c6e

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks