General

  • Target

    Yeni siparis listesi.exe

  • Size

    1013KB

  • Sample

    221005-meszeaeae3

  • MD5

    add891fdc3f5ac2ff276e6529df08954

  • SHA1

    29485243206d1825c28109fac8f492cf2ab3b30d

  • SHA256

    b3cd5ca1cfe3eeaff6e38ee71593415d63c5f2117c3a1c3a4bbbbde98e46171e

  • SHA512

    334b987cdbcf796f278d585ef98cf209a89fe903d9a4f4dc374210861bc5410cf5b013048090f8c46102ad60809f7b805b291860ec09f52227ff6e5cc18ae0f7

  • SSDEEP

    12288:qkQHUxA6s8jEg3sQHniC4uSJdWoQE4/2EK73WLr9RZCqsP031kX3r5wuvYe+msn1:PjO8jEg3DHnyuSjxU3XjZpwzGz

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Targets

    • Target

      Yeni siparis listesi.exe

    • Size

      1013KB

    • MD5

      add891fdc3f5ac2ff276e6529df08954

    • SHA1

      29485243206d1825c28109fac8f492cf2ab3b30d

    • SHA256

      b3cd5ca1cfe3eeaff6e38ee71593415d63c5f2117c3a1c3a4bbbbde98e46171e

    • SHA512

      334b987cdbcf796f278d585ef98cf209a89fe903d9a4f4dc374210861bc5410cf5b013048090f8c46102ad60809f7b805b291860ec09f52227ff6e5cc18ae0f7

    • SSDEEP

      12288:qkQHUxA6s8jEg3sQHniC4uSJdWoQE4/2EK73WLr9RZCqsP031kX3r5wuvYe+msn1:PjO8jEg3DHnyuSjxU3XjZpwzGz

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • ModiLoader Second Stage

    • Xloader payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks