General

  • Target

    f8f21b42.exe

  • Size

    307KB

  • Sample

    220121-rx2fqaaahp

  • MD5

    823e2111b364480598e2c0030cc945c8

  • SHA1

    bdb030ca0f699ebcf3ada6d5fd2fc51d53fc9d76

  • SHA256

    f8f21b428732d4136df057f3ef06f9fdc47b29de832838dcd030ef55e0c31891

  • SHA512

    e7274a90df675b29ab59b8e5c74082411eec7296630814075b9d12a3c15415957289c5d9691c695bb354c2159e569dfa71470998e2c1bc617baa293e44943d05

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

dtt3

Decoy

edilononlineshop.com

cursosd.com

viellacharteredland.com

increasey0urenergylevels.codes

yjy-hotel.com

claym.xyz

reelsguide.com

gives-cardano.com

ashrafannuar.com

mammalians.com

rocketleaguedads.com

yubierp.com

minimi36.com

chn-chn.com

jagojp888.com

parsian-shetab.com

273351.com

mdtouhid.com

babedads.com

vallinam2.com

Targets

    • Target

      f8f21b42.exe

    • Size

      307KB

    • MD5

      823e2111b364480598e2c0030cc945c8

    • SHA1

      bdb030ca0f699ebcf3ada6d5fd2fc51d53fc9d76

    • SHA256

      f8f21b428732d4136df057f3ef06f9fdc47b29de832838dcd030ef55e0c31891

    • SHA512

      e7274a90df675b29ab59b8e5c74082411eec7296630814075b9d12a3c15415957289c5d9691c695bb354c2159e569dfa71470998e2c1bc617baa293e44943d05

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks