General

  • Target

    214410acd621e551b295b93f5e5f61c1

  • Size

    660KB

  • Sample

    220707-h2mzfshbe2

  • MD5

    214410acd621e551b295b93f5e5f61c1

  • SHA1

    5f6ecc217d61fe0675815eccb242663223c0f947

  • SHA256

    f6b709d4d41b801c2f5df85f05f3396ab9a2d0b1851ebdc5e434b03c184dacd6

  • SHA512

    7788d66004ef9d91faed6aa66c7e6f7bcd3a8d8d27dc6af5c31907165838921f46cdd76eea96b51da5c7b0a6af56a0f1abf3ab419a0844b500214140b19b2485

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

a2es

Decoy

glutenfreebahrain.com

sportrid.com

js-films.com

cie-revolver.com

outsourcinginstitutebd.com

roboticsdatascience.com

tebrunk.com

needgreatwork.com

df1b8j2iwbl33n.life

voluum-training.com

cherna-roza.com

xiyouap.com

bluefiftyfoundation.com

angolettomc.com

yhcp225.com

keondredejawn.com

ifeelsilky.com

coraorganizing.com

smartmindstutorials.com

tanphucuong.info

Targets

    • Target

      214410acd621e551b295b93f5e5f61c1

    • Size

      660KB

    • MD5

      214410acd621e551b295b93f5e5f61c1

    • SHA1

      5f6ecc217d61fe0675815eccb242663223c0f947

    • SHA256

      f6b709d4d41b801c2f5df85f05f3396ab9a2d0b1851ebdc5e434b03c184dacd6

    • SHA512

      7788d66004ef9d91faed6aa66c7e6f7bcd3a8d8d27dc6af5c31907165838921f46cdd76eea96b51da5c7b0a6af56a0f1abf3ab419a0844b500214140b19b2485

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks