General

  • Target

    RECEIPT 0266255252.pif

  • Size

    300KB

  • Sample

    220301-n4lgasbeap

  • MD5

    c7012ce63b4ed9e49bf7be48fc27beae

  • SHA1

    8c91c8e2a90b9e9b3d3dde1fb32e02e5de5dd347

  • SHA256

    b3babb49432b3d09adbf7e79dfb2fe84f4d417ad394ccd59412c9e083a42a673

  • SHA512

    6ded1f1974ace78c102fc60e65cef89b664860edd87938af9efa1b4574de43667b614fbc19f49fae2d018180a2a706181982179193bba5c5ccac565758ee2e60

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

rmfg

Decoy

prospectcompounding.com

grand-prix.voyage

solvingpklogc.xyz

eliamhome.com

gamevip88.club

arsels.info

dswlt.com

dchehe.com

lawyerjerusalem.com

pbnseo.xyz

apuryifuid.com

kiukiupoker88.net

leannonimpact.com

kare-furniture.com

mississaugaremax.online

zpyh198.com

dueplay.store

naimi.ltd

greenstepspodiatry.com

cewirtanen.com

Targets

    • Target

      RECEIPT 0266255252.pif

    • Size

      300KB

    • MD5

      c7012ce63b4ed9e49bf7be48fc27beae

    • SHA1

      8c91c8e2a90b9e9b3d3dde1fb32e02e5de5dd347

    • SHA256

      b3babb49432b3d09adbf7e79dfb2fe84f4d417ad394ccd59412c9e083a42a673

    • SHA512

      6ded1f1974ace78c102fc60e65cef89b664860edd87938af9efa1b4574de43667b614fbc19f49fae2d018180a2a706181982179193bba5c5ccac565758ee2e60

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks