General

  • Target

    R00127789.exe

  • Size

    754KB

  • Sample

    220521-ahq8rsdbeq

  • MD5

    5ade5905aebb3d0f6cafd3d36c01927b

  • SHA1

    8b5f6901647c9f17114e3092fc2b226c7478121d

  • SHA256

    d10a6b48293d226a0700a84f7dc756fe50c78a9d167500e3b3c763781c52b006

  • SHA512

    c2e324286d7a819f9dc228b51258e888db980fbdd5a05171bd25ba6c742b3ff71d285db095ab7d577f620f8a3e5baba0c863154d4f63df6e5b1e0241362421a4

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mjup

Decoy

cyqcc.com

mynext.guru

clickbuzz.tech

testingsitewp.store

starblast.space

xn--cocola-6wa.com

kathicrafts.com

tiktokshop.cloud

akasa42.com

therosedalefw.com

fabuluxepicnicsatl.com

dtoyer.com

trungtambtx.com

uploaded.space

newgradient.com

micron365.com

driving-ukrainka.com

feretsfreshcutsproduce.com

1781tudor301.info

mecca-services.com

Targets

    • Target

      R00127789.exe

    • Size

      754KB

    • MD5

      5ade5905aebb3d0f6cafd3d36c01927b

    • SHA1

      8b5f6901647c9f17114e3092fc2b226c7478121d

    • SHA256

      d10a6b48293d226a0700a84f7dc756fe50c78a9d167500e3b3c763781c52b006

    • SHA512

      c2e324286d7a819f9dc228b51258e888db980fbdd5a05171bd25ba6c742b3ff71d285db095ab7d577f620f8a3e5baba0c863154d4f63df6e5b1e0241362421a4

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

1
T1082

Tasks