General

  • Target

    c8e543607841185cc38e8b2c4150d4fa9d14bd54fbd2cd43cc256485aae62ef8

  • Size

    373KB

  • Sample

    230820-wawn6sad3t

  • MD5

    1f42843d965171d657fc251a18e79937

  • SHA1

    2790bb065af77a4d2857c58188ced3046b74940f

  • SHA256

    c8e543607841185cc38e8b2c4150d4fa9d14bd54fbd2cd43cc256485aae62ef8

  • SHA512

    2d9326741591dc2e2feebd6f5c60be1ae86688e832090b4f1c777173e790a6bacbd908c229495975962a2bea62b78a28cc8f8ece5546a3acc653303c38ed9d06

  • SSDEEP

    6144:bjaohYpyMkhBTJKLDW5dhpTTsdXJWqAIdYrSLdal3tUC80o+cCBtQsIAUVruc:PaoYSBTJnhpUdZbverSxtC8Tc6uIic

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      c8e543607841185cc38e8b2c4150d4fa9d14bd54fbd2cd43cc256485aae62ef8

    • Size

      373KB

    • MD5

      1f42843d965171d657fc251a18e79937

    • SHA1

      2790bb065af77a4d2857c58188ced3046b74940f

    • SHA256

      c8e543607841185cc38e8b2c4150d4fa9d14bd54fbd2cd43cc256485aae62ef8

    • SHA512

      2d9326741591dc2e2feebd6f5c60be1ae86688e832090b4f1c777173e790a6bacbd908c229495975962a2bea62b78a28cc8f8ece5546a3acc653303c38ed9d06

    • SSDEEP

      6144:bjaohYpyMkhBTJKLDW5dhpTTsdXJWqAIdYrSLdal3tUC80o+cCBtQsIAUVruc:PaoYSBTJnhpUdZbverSxtC8Tc6uIic

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks