General

  • Target

    df52f3046504a1273cebafc03bb13ea024b81964eb78a6dbd118478a7c9ce8b4

  • Size

    800KB

  • Sample

    220130-tjytsadgdn

  • MD5

    059c56876497cfe76c5fd67bb83fd8a6

  • SHA1

    d0c8bcffd9a9393e02afa12d0d1d6da3f5ae5426

  • SHA256

    df52f3046504a1273cebafc03bb13ea024b81964eb78a6dbd118478a7c9ce8b4

  • SHA512

    06ce3b9bb8d3c80efae131ec7c5c17168f2ca78b177e94c79b1ef3b36d8b8ab87c1da86468419017aaf34cdcf45e71a6666715014a5d3a5811194939367dfcd5

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

kio8

Decoy

greeaircondition.com

thewilmingtonguide.com

cbluedotlivewdmall.com

globalcrime24.com

heightsplace.com

ghar.pro

asosbira.com

melolandia.com

velactun.com

erniesimms.com

nutbullet.com

drizzerstr.com

hnqym888.com

ghorowaseba.com

1317efoxchasedrive.info

stjudetroop623.com

facestaj.com

airpromaskaccessories.com

wolfetailors.com

56ohdc2016.com

Targets

    • Target

      df52f3046504a1273cebafc03bb13ea024b81964eb78a6dbd118478a7c9ce8b4

    • Size

      800KB

    • MD5

      059c56876497cfe76c5fd67bb83fd8a6

    • SHA1

      d0c8bcffd9a9393e02afa12d0d1d6da3f5ae5426

    • SHA256

      df52f3046504a1273cebafc03bb13ea024b81964eb78a6dbd118478a7c9ce8b4

    • SHA512

      06ce3b9bb8d3c80efae131ec7c5c17168f2ca78b177e94c79b1ef3b36d8b8ab87c1da86468419017aaf34cdcf45e71a6666715014a5d3a5811194939367dfcd5

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks