General

  • Target

    ba46838d8445539ef9360355459abfdf8d0932d80f26cd8682fbaf2a236461da

  • Size

    412KB

  • Sample

    220131-pp777ahgb4

  • MD5

    a75c88bdafcead6c2096d01dc8f2f052

  • SHA1

    d36d981a34f591eada1df8ea230bbfbdcbd6bf97

  • SHA256

    ba46838d8445539ef9360355459abfdf8d0932d80f26cd8682fbaf2a236461da

  • SHA512

    b8d3d14112e5910d906c74c63d0208ac02e8e29b230d92bef1d7c6098a65c0b7660841a5fcefebaf96edf969cdeda62282cd642d56c63fe711a23ea0112edd41

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

nt3f

Decoy

tricyclee.com

kxsw999.com

wisteria-pavilion.com

bellaclancy.com

promissioskincare.com

hzy001.xyz

checkouthomehd.com

soladere.com

point4sales.com

socalmafia.com

libertadysarmiento.online

nftthirty.com

digitalgoldcryptostock.net

tulekiloscaird.com

austinfishandchicken.com

wlxxch.com

mgav51.xyz

landbanking.global

saprove.com

babyfaces.skin

Targets

    • Target

      ba46838d8445539ef9360355459abfdf8d0932d80f26cd8682fbaf2a236461da

    • Size

      412KB

    • MD5

      a75c88bdafcead6c2096d01dc8f2f052

    • SHA1

      d36d981a34f591eada1df8ea230bbfbdcbd6bf97

    • SHA256

      ba46838d8445539ef9360355459abfdf8d0932d80f26cd8682fbaf2a236461da

    • SHA512

      b8d3d14112e5910d906c74c63d0208ac02e8e29b230d92bef1d7c6098a65c0b7660841a5fcefebaf96edf969cdeda62282cd642d56c63fe711a23ea0112edd41

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks