General

  • Target

    SKM_1504322RS.exe

  • Size

    192KB

  • Sample

    220423-nk13msgcdp

  • MD5

    d382db9d903f52d9f2f7eb2c1039b824

  • SHA1

    c2e97ed52203259715f51ee9844176e18ea2cbbe

  • SHA256

    59552104d4bb2bcc6518dab735dac7dbb731a988dda8b82d39fa10911e7b8ee3

  • SHA512

    93711c47076a3c90d63ecf79b5d17a4a0f188cc7fd790f9af0740ee0907876fdbbc33da4e84a0f1b85050e9a00b0f05a592a78c0822b8251d3011f50427e56b3

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Targets

    • Target

      SKM_1504322RS.exe

    • Size

      192KB

    • MD5

      d382db9d903f52d9f2f7eb2c1039b824

    • SHA1

      c2e97ed52203259715f51ee9844176e18ea2cbbe

    • SHA256

      59552104d4bb2bcc6518dab735dac7dbb731a988dda8b82d39fa10911e7b8ee3

    • SHA512

      93711c47076a3c90d63ecf79b5d17a4a0f188cc7fd790f9af0740ee0907876fdbbc33da4e84a0f1b85050e9a00b0f05a592a78c0822b8251d3011f50427e56b3

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks