General

  • Target

    d6ff1bf3d769e567a0e41f7651a56c07.exe

  • Size

    293KB

  • Sample

    220214-h4dhsshhbn

  • MD5

    d6ff1bf3d769e567a0e41f7651a56c07

  • SHA1

    291bcef2a4335eaac400271209d0c0e99486b64c

  • SHA256

    4d854fee4f2e2a7b2afb2c13b28207f5388b095d0f7f053b90e03cf5873904e9

  • SHA512

    aeaf170b6771653c13140aace7c4803ecdeee1dab95c2986f1893f63aaddab84ae7255095cb55b0c86c857684c90b5e5f8c764ec7e69dc3a7c6f9340cbc080e6

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

o6tg

Decoy

turkscaicosonline.com

novelfoodtech.com

zgrmfww.com

gestionalcliente24hrs.store

postrojka.com

tapissier-uzes.com

tobytram.one

preamblegames.com

clicklinkzs.com

franksenen.com

beautygateway.net

foils-online.com

aout.us

promarkoperations.com

alignatura.com

changemylifefast.info

minbex.icu

internethustlersociety.com

chinacqn.com

fibsh.com

Targets

    • Target

      d6ff1bf3d769e567a0e41f7651a56c07.exe

    • Size

      293KB

    • MD5

      d6ff1bf3d769e567a0e41f7651a56c07

    • SHA1

      291bcef2a4335eaac400271209d0c0e99486b64c

    • SHA256

      4d854fee4f2e2a7b2afb2c13b28207f5388b095d0f7f053b90e03cf5873904e9

    • SHA512

      aeaf170b6771653c13140aace7c4803ecdeee1dab95c2986f1893f63aaddab84ae7255095cb55b0c86c857684c90b5e5f8c764ec7e69dc3a7c6f9340cbc080e6

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE APT-C-23 Activity (GET)

      suricata: ET MALWARE APT-C-23 Activity (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks