General

  • Target

    Cslmw.exe

  • Size

    23KB

  • Sample

    220311-3ght8affbr

  • MD5

    f252b7a35b4b4af6a7dee8840b1e7132

  • SHA1

    e9fa1a744adc80c91203aaf06e4edbcd25cac199

  • SHA256

    4a5a4b370430e4f8fed7a3e8e7deb08321740497e0e693482352d2db973dbabd

  • SHA512

    389e94b834f64609e8b2a861f5697a3b5b7eee4e2f71b76ae19a616560bd1f8d1d3396cf13e657c41792e43caedd61fe6641983819bbf83f8625fbd693c65af5

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ssac

Decoy

beautybybrin.com

oregemo.com

prospectoriq.com

blazermid.com

cloudnineloans.com

myyntisofta.com

filoupoils.com

web-solutiontnpasumo3.xyz

becbares.com

lines-hikkoshi.com

ohayouwww.com

writingdadsobituarywithdad.com

bridalbaes.com

jamshir.com

rangertots.com

dankbrobeans.com

titan111.com

uplearns.info

maxicashprokil.xyz

evc24.com

Targets

    • Target

      Cslmw.exe

    • Size

      23KB

    • MD5

      f252b7a35b4b4af6a7dee8840b1e7132

    • SHA1

      e9fa1a744adc80c91203aaf06e4edbcd25cac199

    • SHA256

      4a5a4b370430e4f8fed7a3e8e7deb08321740497e0e693482352d2db973dbabd

    • SHA512

      389e94b834f64609e8b2a861f5697a3b5b7eee4e2f71b76ae19a616560bd1f8d1d3396cf13e657c41792e43caedd61fe6641983819bbf83f8625fbd693c65af5

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks