General

  • Target

    Ingenier�a & Desarrollo LSP140322.7z

  • Size

    721KB

  • Sample

    220314-sdwlssagep

  • MD5

    23506792a98a97478688f72719553186

  • SHA1

    00559b7ab15c32bad09afbd2dff555562b8e82e2

  • SHA256

    4eb40a6b3ce3b6cc6b6fa80a9c07830d24a159be186d679b389da531425a7bed

  • SHA512

    8cc0103d5597cc7fae1074d1a2ecbdd3d1e85f0853f7a0fa69045898795f5d9963cf0ceb87cf00e968e70524654c4bff2757bc5653831cea4b311d5c0304ab47

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Targets

    • Target

      LSP140322.exe

    • Size

      924KB

    • MD5

      88d41675e7350635b69789e3fde00033

    • SHA1

      7052d7dbe1a57c23be25673a1ac6a89facd6fa28

    • SHA256

      90b9df6a803fce475920ccd036a647601a8f65bec5a7a9bbdd59a86b4bf004bf

    • SHA512

      38639cb9a955bc6ab88c77e44391b23b082157100cee9646a10cb09722adc9c6c485bae4617121395ccedde0b6725737cc0171fee7afbbae80f4bc1863f02f21

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks