General

  • Target

    4f6fa448454b581d6c8e7aa6ed3ef72e66062bf8

  • Size

    517KB

  • Sample

    230201-fwjzhaca34

  • MD5

    9eb9ce6fa80e866fccb277b400033685

  • SHA1

    4f6fa448454b581d6c8e7aa6ed3ef72e66062bf8

  • SHA256

    d66c034380086e36912b8865f41b0dc3ea540a014ec42579ac9645dca5ae4858

  • SHA512

    16bea65d58a3f968110411b067ea7cbdb4cab5ebd1edbf9d94428fed1bc0e40741c799b0c4d6ddd9de3e87f18322416924f03478a6041f8566f64f7bded9e760

  • SSDEEP

    12288:Eg8tD+p1h79i/DdVedE5fJD7uwkIPveEosOgGSgSkrcq3qilOL:EgwVDdcE5fJheEovgYSkwq3qis

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ubqx

Decoy

missingounces.com

lanjay.com

whizbets.com

maltaprefix.icu

vmatranslations.com

nuno-hh.com

dxcsmm.com

maxirnintegrated.com

jpavwa.com

shieldsvalleyrancher.com

chennaimarketplace.store

onlineordersecrets.com

missysluxuryhairbundles.com

olmtopst.info

abcbooch.com

aycarcarrental.com

firsttexassubaru.com

lessstuffmorestory.com

nassausbestroofers.com

j976.net

Targets

    • Target

      4f6fa448454b581d6c8e7aa6ed3ef72e66062bf8

    • Size

      517KB

    • MD5

      9eb9ce6fa80e866fccb277b400033685

    • SHA1

      4f6fa448454b581d6c8e7aa6ed3ef72e66062bf8

    • SHA256

      d66c034380086e36912b8865f41b0dc3ea540a014ec42579ac9645dca5ae4858

    • SHA512

      16bea65d58a3f968110411b067ea7cbdb4cab5ebd1edbf9d94428fed1bc0e40741c799b0c4d6ddd9de3e87f18322416924f03478a6041f8566f64f7bded9e760

    • SSDEEP

      12288:Eg8tD+p1h79i/DdVedE5fJD7uwkIPveEosOgGSgSkrcq3qilOL:EgwVDdcE5fJheEovgYSkwq3qis

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks