General

  • Target

    37dc7edf8d328692e168888bd219de366cd7114965184ec2fe716046652b81c3

  • Size

    637KB

  • Sample

    220518-c3b1paehen

  • MD5

    8d6a4404edc6cceb62c96399991b35fc

  • SHA1

    ddca329231e31acd27a46b6579937a23a4d6678e

  • SHA256

    37dc7edf8d328692e168888bd219de366cd7114965184ec2fe716046652b81c3

  • SHA512

    4d8e2e6ba6fe095512954d5d5de954c161c0dee5d9cb715fa118de6357d6ae18a9c685c9139c98335672b6cb76b2de897de1a61338649801b3a396ec05c67005

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

r007

Decoy

trashpandaservice.com

mobileads.network

ascolstore.com

gelsinextra.com

bonestell.net

heitoll.xyz

ceapgis.com

mon-lapin.biz

miq-eva.com

rematedesillas.com

playingonline.xyz

hausense.quest

tnyzw.com

appsdial.com

addcolor.city

hagenoblog.com

michaelwesleyj.com

she-zain.com

lorhsems.com

karmaserena.com

Targets

    • Target

      37dc7edf8d328692e168888bd219de366cd7114965184ec2fe716046652b81c3

    • Size

      637KB

    • MD5

      8d6a4404edc6cceb62c96399991b35fc

    • SHA1

      ddca329231e31acd27a46b6579937a23a4d6678e

    • SHA256

      37dc7edf8d328692e168888bd219de366cd7114965184ec2fe716046652b81c3

    • SHA512

      4d8e2e6ba6fe095512954d5d5de954c161c0dee5d9cb715fa118de6357d6ae18a9c685c9139c98335672b6cb76b2de897de1a61338649801b3a396ec05c67005

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks