General

  • Target

    Purchase Order FEB22_76543.zip

  • Size

    404KB

  • Sample

    220215-txj8jshab5

  • MD5

    75c854ac436065b21632b53439dc280b

  • SHA1

    c75a5c4f7a6e8dce4256d7c2734d4f590ef9eb72

  • SHA256

    75e22fcb60b80d56eacab3159484d01794108aff758e57331011dd213502f364

  • SHA512

    5bb9080c057292c9e55d022e1081bfd2ee5626e6351d28c37835b8913a256bec67b34478b105a5057fb4559b82e277bbddf8ee59d37e1d0100344fdc97b7046c

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

zqzw

Decoy

laurentmathieu.com

nohohonndana.com

hhmc.info

shophallows.com

blazebunk.com

goodbridge.xyz

flakycloud.com

bakermckenziegroups.com

formation-adistance.com

lovingearthbotanicals.com

tbrservice.plus

heritagehousehotels.com

drwbuildersco.com

lacsghb.com

wain3x.com

dadreview.club

continiutycp.com

cockgirls.com

48mpt.xyz

033skz.xyz

Targets

    • Target

      Purchase Order FEB22_76543.exe

    • Size

      759KB

    • MD5

      03fe2e5b5e59253d0815b2e121fa1e30

    • SHA1

      eed9bbbb504bf208449c764fece9ccec3f23e771

    • SHA256

      08e2b0e469f2809991e59e65177fe994f3aeeea601a2af8aec6c7ae1406debb0

    • SHA512

      a032b27abca34d611e4073453e04d9b2ffcfec8c239eca5aa10203117013b1b872031ac9ac42ebb174acd8acf49f6a1505940826e1900eef05fca1cf6ba6f09c

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks