General

  • Target

    121a6914b86cfc9ca8d12864cba4da75

  • Size

    1.2MB

  • Sample

    231230-h9r85saheq

  • MD5

    121a6914b86cfc9ca8d12864cba4da75

  • SHA1

    7ba4deaac4c28cf4d60ceaf3e66dff2dfce75ae9

  • SHA256

    93986eac8652157b41ac4464bed7584c6b0c04a3fcdd8bcda47592df69fee3ba

  • SHA512

    5d0f8e1fe822f2e142ac3f9bdb8795708fe7b6df6ce2a75f9db9365930e6b58ed7362aa342133fafe9d7774dcdf25ccb5e1a3e3cc30c1374b2440ae39228f9e8

  • SSDEEP

    24576:xDS/d3BKzksPks2y8jeLELZ7UuyvA1MN6ZNZZ:AKquLEF7UzvbN6ZNZ

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      121a6914b86cfc9ca8d12864cba4da75

    • Size

      1.2MB

    • MD5

      121a6914b86cfc9ca8d12864cba4da75

    • SHA1

      7ba4deaac4c28cf4d60ceaf3e66dff2dfce75ae9

    • SHA256

      93986eac8652157b41ac4464bed7584c6b0c04a3fcdd8bcda47592df69fee3ba

    • SHA512

      5d0f8e1fe822f2e142ac3f9bdb8795708fe7b6df6ce2a75f9db9365930e6b58ed7362aa342133fafe9d7774dcdf25ccb5e1a3e3cc30c1374b2440ae39228f9e8

    • SSDEEP

      24576:xDS/d3BKzksPks2y8jeLELZ7UuyvA1MN6ZNZZ:AKquLEF7UzvbN6ZNZ

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks