General

  • Target

    68239a914c97e9fab8025768cff809ac841076a39963a5416810ad9c697ae2d5

  • Size

    1.2MB

  • Sample

    220131-vz8vcsadaq

  • MD5

    210281ba8584eef02754bb15a9c83d36

  • SHA1

    4603f1cd443feaece6e5167b0c2f6a0486aa73b6

  • SHA256

    68239a914c97e9fab8025768cff809ac841076a39963a5416810ad9c697ae2d5

  • SHA512

    b4c3466d87f56c2a0954a7d4b47a430babffe9dba4dfbbd5f6837b299164e2a74775db975ae822a7013c3358f7abd7321afc6bbc63a57edb07a33316afeda3b8

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

mabs

Decoy

joiderqm.com

hyc306.com

ouchplus.asia

abrosnm3.com

hospitalanti-infectives.com

ala-co.com

morrisonltts.net

tradingimpulse.com

invisibleimagination.com

jdjshop.com

huntedby.com

szsgfdzx.com

germfightersusaiowa.com

pahaadpost.com

obrankers.com

plaeralum.com

getfitwithmeministry.com

smartswaploan.com

gypsyjewelrydesigns.com

meetgoodwill.info

Targets

    • Target

      XXXXXXXX.EXE

    • Size

      228KB

    • MD5

      3f79af5c415898c279c6d5f76e8dd710

    • SHA1

      6d633461533eca9413ef699b7e68d245261a88c9

    • SHA256

      10a451fc1e7687549d6e116dd5ff984f3468de4dcc6e1494ed16c6c501668eb6

    • SHA512

      d6fb55e05ab09f5aee47a51764db246c9d0d4762fe006479c437b7536f14dce14d58213ccf87cab5ab61c419b1520e4631bae7bf9860609fbe8945e782ccb9e4

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks