General

  • Target

    d5a6a2433889b448cfa5ce29b7782a5eec937958cc571c1adf8993325474f6cf

  • Size

    600KB

  • Sample

    220517-l3hb5sacf9

  • MD5

    24dc968b12dbfc6012c80e02d90a298a

  • SHA1

    7791277c7160e3faa214c8a3cdef5ca6f88f4e10

  • SHA256

    d5a6a2433889b448cfa5ce29b7782a5eec937958cc571c1adf8993325474f6cf

  • SHA512

    b03cdc096ea227daff61e384628178b4522e010b83a28741bc655132038763b116d7308c1b28177e4dcbe789de4bdea796faa6620f0f79f9efbd411e509b1578

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

r007

Decoy

trashpandaservice.com

mobileads.network

ascolstore.com

gelsinextra.com

bonestell.net

heitoll.xyz

ceapgis.com

mon-lapin.biz

miq-eva.com

rematedesillas.com

playingonline.xyz

hausense.quest

tnyzw.com

appsdial.com

addcolor.city

hagenoblog.com

michaelwesleyj.com

she-zain.com

lorhsems.com

karmaserena.com

Targets

    • Target

      d5a6a2433889b448cfa5ce29b7782a5eec937958cc571c1adf8993325474f6cf

    • Size

      600KB

    • MD5

      24dc968b12dbfc6012c80e02d90a298a

    • SHA1

      7791277c7160e3faa214c8a3cdef5ca6f88f4e10

    • SHA256

      d5a6a2433889b448cfa5ce29b7782a5eec937958cc571c1adf8993325474f6cf

    • SHA512

      b03cdc096ea227daff61e384628178b4522e010b83a28741bc655132038763b116d7308c1b28177e4dcbe789de4bdea796faa6620f0f79f9efbd411e509b1578

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks