General

  • Target

    b5e9e569f9f7ecb39c5c1b14adbfdccc

  • Size

    664KB

  • Sample

    220707-hvb9dahaf8

  • MD5

    b5e9e569f9f7ecb39c5c1b14adbfdccc

  • SHA1

    9f26e3b6775395f910f142d022dfc43b0c20ce9e

  • SHA256

    e87d10354cac12ec322ce8ac5f24b7df6e207d587a57e69c88c08babb6b0744e

  • SHA512

    f6cc0f242b196094b32e41f129dbec890feee9dd1377b1b1bc3fc41690d03e286d6cac03443543d0d0bf81b349f585ad7f5df610ae7f939294402823536a768d

Score
10/10

Malware Config

Targets

    • Target

      b5e9e569f9f7ecb39c5c1b14adbfdccc

    • Size

      664KB

    • MD5

      b5e9e569f9f7ecb39c5c1b14adbfdccc

    • SHA1

      9f26e3b6775395f910f142d022dfc43b0c20ce9e

    • SHA256

      e87d10354cac12ec322ce8ac5f24b7df6e207d587a57e69c88c08babb6b0744e

    • SHA512

      f6cc0f242b196094b32e41f129dbec890feee9dd1377b1b1bc3fc41690d03e286d6cac03443543d0d0bf81b349f585ad7f5df610ae7f939294402823536a768d

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks