General

  • Target

    38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a

  • Size

    806KB

  • Sample

    220707-prkjxagcfk

  • MD5

    2a552d3676776043ba816a122691e003

  • SHA1

    29f799ce2d6e4268603e5ca310621eda23b92bd7

  • SHA256

    38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a

  • SHA512

    55eb70369368044a654578a703e0856cdc505d2e312dd488216937ca2149f45b785610727713c713b87846f79840e0034cce7aa533fe05a37eb1911a8f331fbf

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://textbin.net/raw/a3gbusy118

Targets

    • Target

      38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a

    • Size

      806KB

    • MD5

      2a552d3676776043ba816a122691e003

    • SHA1

      29f799ce2d6e4268603e5ca310621eda23b92bd7

    • SHA256

      38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a

    • SHA512

      55eb70369368044a654578a703e0856cdc505d2e312dd488216937ca2149f45b785610727713c713b87846f79840e0034cce7aa533fe05a37eb1911a8f331fbf

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Blocklisted process makes network request

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks