General

  • Target

    59ddaf036f92887a34441505f84d8cc8

  • Size

    701KB

  • Sample

    231222-dvdpzsacgl

  • MD5

    59ddaf036f92887a34441505f84d8cc8

  • SHA1

    85745689e2f889b94b37379393a97a7a87dfec8b

  • SHA256

    34f75f8458b1f58bdb1e8ff1a46270f98c6d246d213413cd0c4a7708e15e82c9

  • SHA512

    336d392772f6d65f203f246c462673c92a293b91f4afc226c9613a80444004f69ef18572854e5755b22602efebfe6a0ad167a12a97ba00922a0fc8aaa3d7b0e5

  • SSDEEP

    12288:YM5UfAgDfyobCd6HaQITcFne82kWO3+VUPObK1Cnf2VtYLrlz1+e+:ngDfyL8hle8TxHwl

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

t75f

Decoy

onegolfsydney.com

kaizensportscoaching.com

mliacbjv.icu

rinstech.net

midas-parts.com

istmenian.com

ibrahimpike.com

herbspaces.com

gentleman4higher.com

workabusiness.com

isabusive.website

222555dy.com

lwhyzhzb.xyz

gabrielabravoillanes.com

hearthomelife.com

buildswealth.com

printitaz.com

l-mventures.com

baincot3.com

nstaq-labs.com

Targets

    • Target

      59ddaf036f92887a34441505f84d8cc8

    • Size

      701KB

    • MD5

      59ddaf036f92887a34441505f84d8cc8

    • SHA1

      85745689e2f889b94b37379393a97a7a87dfec8b

    • SHA256

      34f75f8458b1f58bdb1e8ff1a46270f98c6d246d213413cd0c4a7708e15e82c9

    • SHA512

      336d392772f6d65f203f246c462673c92a293b91f4afc226c9613a80444004f69ef18572854e5755b22602efebfe6a0ad167a12a97ba00922a0fc8aaa3d7b0e5

    • SSDEEP

      12288:YM5UfAgDfyobCd6HaQITcFne82kWO3+VUPObK1Cnf2VtYLrlz1+e+:ngDfyL8hle8TxHwl

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Discovery

System Information Discovery

1
T1082

Tasks