General

  • Target

    Order-826141730-pdf.pif

  • Size

    289KB

  • Sample

    220217-jm5fmabhdr

  • MD5

    8a43982e93e888387968e03fafb14fd1

  • SHA1

    6328f5db0bd9a28dcfb71b936c6835c375299551

  • SHA256

    6cd98e5cee60f33ca33f4e49d5f230feb6152510230abd25f8b5beab47e2afec

  • SHA512

    68e5b99a36934d0afc494c18607731b146e069b431c210684016b21c48db3b1c3c876084a3641a0a7a59b01fce1c28d9e9210a55666cb62a24170e45b204d113

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Targets

    • Target

      Order-826141730-pdf.pif

    • Size

      289KB

    • MD5

      8a43982e93e888387968e03fafb14fd1

    • SHA1

      6328f5db0bd9a28dcfb71b936c6835c375299551

    • SHA256

      6cd98e5cee60f33ca33f4e49d5f230feb6152510230abd25f8b5beab47e2afec

    • SHA512

      68e5b99a36934d0afc494c18607731b146e069b431c210684016b21c48db3b1c3c876084a3641a0a7a59b01fce1c28d9e9210a55666cb62a24170e45b204d113

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks