General

  • Target

    6becb7e3e5c369e12bd11209a7e726ab

  • Size

    630KB

  • Sample

    231226-nxxwraehhm

  • MD5

    6becb7e3e5c369e12bd11209a7e726ab

  • SHA1

    8fa87a66e5ba06327c731054b5dfe338a76fb1f3

  • SHA256

    24f5b6729bb4de4dfa691da018caf46ab4fdb01d08fd59d78422f67d833d7167

  • SHA512

    49c5846e3591653a731cf0b86205a95b74b6b8d31303e4372a5ec3b099bac92aa1d4908cec20159bc29928056ca9e502364d8eadc206370faaf12fa8a4e4c872

  • SSDEEP

    12288:o8Ssuf6ikPjxdoCnZGuCVD3yPx9OqLuIv3iYimYw/aIWXOTkuQQ4WPiCU7mo5oFY:p/w6i0jxXEqmKuqnYwpWD7mo5oFCEkv

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      6becb7e3e5c369e12bd11209a7e726ab

    • Size

      630KB

    • MD5

      6becb7e3e5c369e12bd11209a7e726ab

    • SHA1

      8fa87a66e5ba06327c731054b5dfe338a76fb1f3

    • SHA256

      24f5b6729bb4de4dfa691da018caf46ab4fdb01d08fd59d78422f67d833d7167

    • SHA512

      49c5846e3591653a731cf0b86205a95b74b6b8d31303e4372a5ec3b099bac92aa1d4908cec20159bc29928056ca9e502364d8eadc206370faaf12fa8a4e4c872

    • SSDEEP

      12288:o8Ssuf6ikPjxdoCnZGuCVD3yPx9OqLuIv3iYimYw/aIWXOTkuQQ4WPiCU7mo5oFY:p/w6i0jxXEqmKuqnYwpWD7mo5oFCEkv

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks