General

  • Target

    vsl_rfq01209800122.exe

  • Size

    249KB

  • Sample

    220125-lfzmxadaek

  • MD5

    c348f7fa655d92a8af86e74aa75821e6

  • SHA1

    3b9a060bb64b880595287fcc300d4b5513acb879

  • SHA256

    fd86ed836eaae451df45e757be525d3c9260d72e0c8af2eb85f1832a8499eac1

  • SHA512

    65b4275494e326fa96b9e89e95c9688097eaddde8af4b57cbe01471f01986239fc314b914952286d0e1fe9543f93c44964e9191cc95bea7b345be606862495b4

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

igwa

Decoy

listingswithalex.com

funtabse.com

aydenwalling.com

prochal.net

superfoodsnederland.com

moldluck.com

dianekgordon.store

regionalhomescommercial.com

mysecuritymadesimple.com

malwaremastery.com

kodaikeiko.com

jrzg996.com

agricurve.net

songlingjiu.com

virginianundahfishingclub.com

friendschance.com

pastelpresents.com

answertitles.com

survival-hunter.com

nxfddl.com

Targets

    • Target

      vsl_rfq01209800122.exe

    • Size

      249KB

    • MD5

      c348f7fa655d92a8af86e74aa75821e6

    • SHA1

      3b9a060bb64b880595287fcc300d4b5513acb879

    • SHA256

      fd86ed836eaae451df45e757be525d3c9260d72e0c8af2eb85f1832a8499eac1

    • SHA512

      65b4275494e326fa96b9e89e95c9688097eaddde8af4b57cbe01471f01986239fc314b914952286d0e1fe9543f93c44964e9191cc95bea7b345be606862495b4

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks