General

  • Target

    tmp

  • Size

    337KB

  • Sample

    220302-tf93mshbdp

  • MD5

    922b85fda90aeb6b6b23aa0d1847794f

  • SHA1

    a414b5d924f7ee2bf1de38cdd04fdbe62a04c411

  • SHA256

    7791cb00900b2cedf11970c8f42064656b58c61721b9c230fc0ab15af40479d1

  • SHA512

    d8da6261b44dceb5f0aad76aad0a473170eda6b4b79c8a0f4fcd486e18e50bf913a903bf475ec736e0da4497b9b2922e7c7782cb8e0a3bb6fa3fa1a0ab120f59

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p2a5

Decoy

gorillaslovebananas.com

zonaextasis.com

digitalpravin.online

memorialdoors.com

departmenteindhoven.com

vipulb.com

ruyibao365.com

ynpzz.com

matthewandjessica.com

winfrey2024.com

janetride.com

arairazur.xyz

alltheheads.com

amayawebdesigns.com

califunder.com

blacksource.xyz

farmasi.agency

ilmkibahar.com

thinkcentury.net

eskortclub.com

Targets

    • Target

      tmp

    • Size

      337KB

    • MD5

      922b85fda90aeb6b6b23aa0d1847794f

    • SHA1

      a414b5d924f7ee2bf1de38cdd04fdbe62a04c411

    • SHA256

      7791cb00900b2cedf11970c8f42064656b58c61721b9c230fc0ab15af40479d1

    • SHA512

      d8da6261b44dceb5f0aad76aad0a473170eda6b4b79c8a0f4fcd486e18e50bf913a903bf475ec736e0da4497b9b2922e7c7782cb8e0a3bb6fa3fa1a0ab120f59

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

2
T1082

Tasks