General

  • Target

    db751d20fa3ae449c73167571724c5dc773161f33e095ef74fa23ca66cfa8129

  • Size

    247KB

  • Sample

    220126-z8fbmaahh8

  • MD5

    8f13317cb13f7f7a4f2036425ba515af

  • SHA1

    eda002528d869ea5c9aa5e4d64f9d202c6b3a363

  • SHA256

    db751d20fa3ae449c73167571724c5dc773161f33e095ef74fa23ca66cfa8129

  • SHA512

    91d7a52df51d300ec3e336e78e1f34dea0995b2b9d65de4f23782f9d799e8b883e8d0563d4af10e699b44bd3b3ce8b773ad677bcf1025ec779d168df9e927b40

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

o6tg

Decoy

turkscaicosonline.com

novelfoodtech.com

zgrmfww.com

gestionalcliente24hrs.store

postrojka.com

tapissier-uzes.com

tobytram.one

preamblegames.com

clicklinkzs.com

franksenen.com

beautygateway.net

foils-online.com

aout.us

promarkoperations.com

alignatura.com

changemylifefast.info

minbex.icu

internethustlersociety.com

chinacqn.com

fibsh.com

Targets

    • Target

      db751d20fa3ae449c73167571724c5dc773161f33e095ef74fa23ca66cfa8129

    • Size

      247KB

    • MD5

      8f13317cb13f7f7a4f2036425ba515af

    • SHA1

      eda002528d869ea5c9aa5e4d64f9d202c6b3a363

    • SHA256

      db751d20fa3ae449c73167571724c5dc773161f33e095ef74fa23ca66cfa8129

    • SHA512

      91d7a52df51d300ec3e336e78e1f34dea0995b2b9d65de4f23782f9d799e8b883e8d0563d4af10e699b44bd3b3ce8b773ad677bcf1025ec779d168df9e927b40

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks