General

  • Target

    c0904a36e97e50225bc8ab11f7a9c588ebc758b1dc624d39d94da1f5268b847e

  • Size

    283KB

  • Sample

    220120-dhcbdsfda7

  • MD5

    c8d33f72301ac9ac24009e27ac7e53ef

  • SHA1

    1e1fadb528d4a707d91387c3a7525ed3bd1ceb05

  • SHA256

    c0904a36e97e50225bc8ab11f7a9c588ebc758b1dc624d39d94da1f5268b847e

  • SHA512

    087213a85d60a00380bd27dfb38b55b69115a117a7ae0fc815cfe711c4248231b025a75225bbdbc052cfb09ec2dc3366d0ceba6d6f4a51355f3636e0cf0262a3

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

jdo2

Decoy

adopte-un-per.com

lmandarin.com

shonemurawni.quest

bantasis.com

jsdigitalekuns.net

hiddenroom.net

arungjerampangalengan.com

yinghongxw.com

buzzcupid.com

lattent.digital

faxtoemailguide.com

romanticfriryrose.com

ruleaou.com

mochiko-blog.com

sekireixploit.com

bcx-wiremesh.com

jobportalsg.com

wysspirit.com

iflycny.com

sh-cy17.com

Targets

    • Target

      c0904a36e97e50225bc8ab11f7a9c588ebc758b1dc624d39d94da1f5268b847e

    • Size

      283KB

    • MD5

      c8d33f72301ac9ac24009e27ac7e53ef

    • SHA1

      1e1fadb528d4a707d91387c3a7525ed3bd1ceb05

    • SHA256

      c0904a36e97e50225bc8ab11f7a9c588ebc758b1dc624d39d94da1f5268b847e

    • SHA512

      087213a85d60a00380bd27dfb38b55b69115a117a7ae0fc815cfe711c4248231b025a75225bbdbc052cfb09ec2dc3366d0ceba6d6f4a51355f3636e0cf0262a3

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks