General

  • Target

    TNT Original Invoice.exe

  • Size

    702KB

  • Sample

    220216-w665sadcep

  • MD5

    496ae0e6d2f28a0598ef4cab69b175c7

  • SHA1

    561eef1bd4ac98a329a301b6b3b471b792d1e52f

  • SHA256

    670a250601cc6d66fe3491438274b4a3de650b7283525caf699ab7d81ff93b93

  • SHA512

    a30f03b755e24c6cffab59bdfa8e1e9b2a827c51d6e9225390cca309ce62ccbce07bd6eaafc4438f33b2b81b73651d68d204a5428cb6f71d8e90300eb7f4ff7b

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

zqzw

Decoy

laurentmathieu.com

nohohonndana.com

hhmc.info

shophallows.com

blazebunk.com

goodbridge.xyz

flakycloud.com

bakermckenziegroups.com

formation-adistance.com

lovingearthbotanicals.com

tbrservice.plus

heritagehousehotels.com

drwbuildersco.com

lacsghb.com

wain3x.com

dadreview.club

continiutycp.com

cockgirls.com

48mpt.xyz

033skz.xyz

Targets

    • Target

      TNT Original Invoice.exe

    • Size

      702KB

    • MD5

      496ae0e6d2f28a0598ef4cab69b175c7

    • SHA1

      561eef1bd4ac98a329a301b6b3b471b792d1e52f

    • SHA256

      670a250601cc6d66fe3491438274b4a3de650b7283525caf699ab7d81ff93b93

    • SHA512

      a30f03b755e24c6cffab59bdfa8e1e9b2a827c51d6e9225390cca309ce62ccbce07bd6eaafc4438f33b2b81b73651d68d204a5428cb6f71d8e90300eb7f4ff7b

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks