General

  • Target

    PO 042022_pdf.exe

  • Size

    302KB

  • Sample

    220315-ss7mlsbeak

  • MD5

    e11ad2dea6d6f7e0c18f7bcd68145c0b

  • SHA1

    afd9685a534c21a71a66c51753579a8df45b2da3

  • SHA256

    b35221e7befb183f64023ff8fe5bffbd5d784780be6f3036e8ad62756273df77

  • SHA512

    7c271ccb18f446776d2b60ded398e0f6cc607e52aaaa8efe18a9f3967924082dd94e93722055343fe12818b00641fb3d3e9d597465786803827f6ce78f4a86e2

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ubqk

Decoy

tundrat-celltherapy.com

superfinance.club

5x5week.com

687504.com

clarkdn.com

potterypklsck.xyz

4m5k.com

21t8.com

94o2ohfjg.com

bhupendratravels.com

nomadashop.com

w388bet.bet

naturalenetwork.net

tupaqu.com

osooir.com

jengly.com

cbsharjah.icu

tokowallpaperbekasi.com

baggamut.com

upoon81.com

Targets

    • Target

      PO 042022_pdf.exe

    • Size

      302KB

    • MD5

      e11ad2dea6d6f7e0c18f7bcd68145c0b

    • SHA1

      afd9685a534c21a71a66c51753579a8df45b2da3

    • SHA256

      b35221e7befb183f64023ff8fe5bffbd5d784780be6f3036e8ad62756273df77

    • SHA512

      7c271ccb18f446776d2b60ded398e0f6cc607e52aaaa8efe18a9f3967924082dd94e93722055343fe12818b00641fb3d3e9d597465786803827f6ce78f4a86e2

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks