General

  • Target

    VIREMENT.exe

  • Size

    244KB

  • Sample

    220410-spk97safdq

  • MD5

    546ee858992bc35eaf00101cbb261471

  • SHA1

    003d0953cd88b93206b92563779f76df890d31be

  • SHA256

    264709538c4d306bfbf521a73d87b5753f38952b09f597ad405c934139a1082c

  • SHA512

    1f2a8af32136206f8786daf92a7e55653a597cc762e1d8625964f8a84d3d82a12504d4b49047a149478151c83da421e238aff76535f4a180c627c42d271ebe10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

cbgo

Decoy

santesha.com

britneysbeautybar.com

sh-cy17.com

jeffcarveragency.com

3117111.com

sobrehosting.net

ddm123.xyz

toxcompliance.com

auditorydesigns.com

vliftfacial.com

ielhii.com

naameliss.com

ritualchariot.com

solchange.com

quatre-vingts.design

lawnmowermashine.com

braceletsstore.net

admappy.com

tollivercoltd.com

vaidix.com

Targets

    • Target

      VIREMENT.exe

    • Size

      244KB

    • MD5

      546ee858992bc35eaf00101cbb261471

    • SHA1

      003d0953cd88b93206b92563779f76df890d31be

    • SHA256

      264709538c4d306bfbf521a73d87b5753f38952b09f597ad405c934139a1082c

    • SHA512

      1f2a8af32136206f8786daf92a7e55653a597cc762e1d8625964f8a84d3d82a12504d4b49047a149478151c83da421e238aff76535f4a180c627c42d271ebe10

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks