General

  • Target

    e14ed8b967fa04080952f514ffedb3e7.pif

  • Size

    241KB

  • Sample

    220208-jy491aeha7

  • MD5

    e14ed8b967fa04080952f514ffedb3e7

  • SHA1

    5b68d7a5e7eda9a258a33c44a654057910807ec9

  • SHA256

    872baceca1bd29e5ea4a12884f62464b17abd4508371201fb7f4080e92713d59

  • SHA512

    0f9a9a3d934aecedb2b7a4bbb94392ff0690f292665d60b365817a0963e031acd9df7e19c1803ac7998e0ae2cf2e9b2391654781a379c958eea62872872b48e1

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Targets

    • Target

      e14ed8b967fa04080952f514ffedb3e7.pif

    • Size

      241KB

    • MD5

      e14ed8b967fa04080952f514ffedb3e7

    • SHA1

      5b68d7a5e7eda9a258a33c44a654057910807ec9

    • SHA256

      872baceca1bd29e5ea4a12884f62464b17abd4508371201fb7f4080e92713d59

    • SHA512

      0f9a9a3d934aecedb2b7a4bbb94392ff0690f292665d60b365817a0963e031acd9df7e19c1803ac7998e0ae2cf2e9b2391654781a379c958eea62872872b48e1

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks