General

  • Target

    917479278d18fb239bb661f3960a821f

  • Size

    265KB

  • Sample

    220602-rnmafaged2

  • MD5

    917479278d18fb239bb661f3960a821f

  • SHA1

    b85df90355ffd75a29855e4488e306433ee8e035

  • SHA256

    3bc7cbfbffcb2fe26936caceab37794a4c9b750d2afe9733d2885860d50727f1

  • SHA512

    c8eb6d79f58fb060d5c019bd73014297ae4fcb6cc3350a74f2bbc96e98d5cd049f3874b4c5d83950b02f9cb116caeaccb8499fc3c8c50a2f761803def2a24535

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Targets

    • Target

      917479278d18fb239bb661f3960a821f

    • Size

      265KB

    • MD5

      917479278d18fb239bb661f3960a821f

    • SHA1

      b85df90355ffd75a29855e4488e306433ee8e035

    • SHA256

      3bc7cbfbffcb2fe26936caceab37794a4c9b750d2afe9733d2885860d50727f1

    • SHA512

      c8eb6d79f58fb060d5c019bd73014297ae4fcb6cc3350a74f2bbc96e98d5cd049f3874b4c5d83950b02f9cb116caeaccb8499fc3c8c50a2f761803def2a24535

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks