General

  • Target

    0afe819fb6bd54d591e7b5b368920793

  • Size

    1.2MB

  • Sample

    231230-cf6lsaafg2

  • MD5

    0afe819fb6bd54d591e7b5b368920793

  • SHA1

    e353c08baaaedd5155a9f972cdd9c0deca5eae4f

  • SHA256

    68a5258c5c468efc0102b57b21cf9b641032d37746f510b2876d93a3271b10f2

  • SHA512

    611484b3c0a3131788931304cfddcff402e06a9d73dbe021b2f0cc00794ced7d5631cfe22d6597813942a24c8ad83d811c17cedbe6cf722e4a17b5864e05da00

  • SSDEEP

    24576:MYRTCmt2OsBgo0q4wMlay98EmOfWzY8d:MQ/oHMlaRJ8Sbd

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      0afe819fb6bd54d591e7b5b368920793

    • Size

      1.2MB

    • MD5

      0afe819fb6bd54d591e7b5b368920793

    • SHA1

      e353c08baaaedd5155a9f972cdd9c0deca5eae4f

    • SHA256

      68a5258c5c468efc0102b57b21cf9b641032d37746f510b2876d93a3271b10f2

    • SHA512

      611484b3c0a3131788931304cfddcff402e06a9d73dbe021b2f0cc00794ced7d5631cfe22d6597813942a24c8ad83d811c17cedbe6cf722e4a17b5864e05da00

    • SSDEEP

      24576:MYRTCmt2OsBgo0q4wMlay98EmOfWzY8d:MQ/oHMlaRJ8Sbd

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks