General

  • Target

    5614fc852594749ecfbc1f741c9a2ad20edce64652a5c422ed4ca7c5943184a7_1643743532785.zip

  • Size

    239KB

  • Sample

    220201-x56nasbbf3

  • MD5

    a26306c550e3c94a60f919f9ec86e054

  • SHA1

    c591d738622b68def0916d37acaa82c6fa2b7c9d

  • SHA256

    660d63fb00fa5f47737a5b22014f8bdf22080722ac16da61216caa5e99210b65

  • SHA512

    ff65d51139ba2aa20a853043321073a519b89c4f723dd5e171e9458c90be908484b0a26f14e61ef25d646cbff51d6b44b34f3716368aefdcfcec0646d7cdb6f9

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Targets

    • Target

      39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.bin

    • Size

      251KB

    • MD5

      130dc13fcd533d00374ef50177d8c54c

    • SHA1

      39c29125a8c776bd6eed886f346804a23d518b77

    • SHA256

      5614fc852594749ecfbc1f741c9a2ad20edce64652a5c422ed4ca7c5943184a7

    • SHA512

      2fce01506706dc9409ed2a231b43c439f76d86e921b7f51c8ba9fc8a044d1004dcce6c0beeda4ec4fcbf15f1df36160073ced6db7916228a5be2512205aa8587

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks