General

  • Target

    68521747022022-pdf.pif

  • Size

    292KB

  • Sample

    220217-jqedlsbhgn

  • MD5

    7e1c671cb921a5a53f7b13695889a10f

  • SHA1

    94007268dc30fd25c465de624ae8e65197740032

  • SHA256

    db097eebc2cb1af575eeb0e7278d466276ddd626cfa0bb5f0b77741679870959

  • SHA512

    fdcdc25ee8f5682bd3f519a9cf56c68bebfde7332a312ad05e112418507a95ccd932c4e0b1d2279f5d800765ecec3374b96443278e640927ce4f6241404fb0dd

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Targets

    • Target

      68521747022022-pdf.pif

    • Size

      292KB

    • MD5

      7e1c671cb921a5a53f7b13695889a10f

    • SHA1

      94007268dc30fd25c465de624ae8e65197740032

    • SHA256

      db097eebc2cb1af575eeb0e7278d466276ddd626cfa0bb5f0b77741679870959

    • SHA512

      fdcdc25ee8f5682bd3f519a9cf56c68bebfde7332a312ad05e112418507a95ccd932c4e0b1d2279f5d800765ecec3374b96443278e640927ce4f6241404fb0dd

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks