General

  • Target

    SecuriteInfo.com.Trojan.DownloaderNET.252.11132.4408

  • Size

    42KB

  • Sample

    220209-q6z4ksafdq

  • MD5

    ea07ec5ed571fe97232b71120ba5e71d

  • SHA1

    70a5f54a056ceaa70e34ea37efd5f668e0360696

  • SHA256

    3e744c3094645bf04cea5756fe54d7b04a32a59bed5d945ac4ccc9b06fb85ef5

  • SHA512

    b840020b46a8ee4b1a54e20015c41221545e0776ebeb67db4e4175969a239630b771f239b183eebfbdc26f072cbfd4dfaeb583fad80e513e7da8d2d7fa18f5f6

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

zqzw

Decoy

laurentmathieu.com

nohohonndana.com

hhmc.info

shophallows.com

blazebunk.com

goodbridge.xyz

flakycloud.com

bakermckenziegroups.com

formation-adistance.com

lovingearthbotanicals.com

tbrservice.plus

heritagehousehotels.com

drwbuildersco.com

lacsghb.com

wain3x.com

dadreview.club

continiutycp.com

cockgirls.com

48mpt.xyz

033skz.xyz

Targets

    • Target

      SecuriteInfo.com.Trojan.DownloaderNET.252.11132.4408

    • Size

      42KB

    • MD5

      ea07ec5ed571fe97232b71120ba5e71d

    • SHA1

      70a5f54a056ceaa70e34ea37efd5f668e0360696

    • SHA256

      3e744c3094645bf04cea5756fe54d7b04a32a59bed5d945ac4ccc9b06fb85ef5

    • SHA512

      b840020b46a8ee4b1a54e20015c41221545e0776ebeb67db4e4175969a239630b771f239b183eebfbdc26f072cbfd4dfaeb583fad80e513e7da8d2d7fa18f5f6

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks