Resubmissions

01-01-2024 19:22

240101-x3jezsafg3 3

01-01-2024 19:18

240101-xz6q4sgaer 10

General

  • Target

    3da917fcd4dec06abb2dcb7d01e843dd

  • Size

    946KB

  • Sample

    240101-xz6q4sgaer

  • MD5

    3da917fcd4dec06abb2dcb7d01e843dd

  • SHA1

    e8f6eba225af1cb200314c75b1a8607a0da0c84e

  • SHA256

    b1a3032124a536928ee9eddfef722df3a881b4a656c76324445327420b50f1ae

  • SHA512

    d345877358dd68dd47da21e63208ff61734798fb7b77ee4ec43cb6a6412da3199db7064a444dc3fbd22f7953a337c2325677be64ed09f109c564f70bf7abf288

  • SSDEEP

    24576:4m5AcK8C0uPJXcvOLZHphAN+gFnTJJt7p:PlKnXcmLZHPAN9ZTvpp

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n8ba

Decoy

thefitflect.com

anytourist.com

blggz.xyz

ascope.club

obyeboss.com

braun-mathematik.online

mtsnurulislamsby.com

jwpropertiestn.com

animalds.com

cunerier.com

sillysocklife.com

shopliyonamaaghin.net

theredcymbalsco.com

lostbikeproject.com

ryggoqlmga.club

realestatetriggers.com

luvlauricephotography.com

cheesehome.cloud

5fashionfix.net

wata-6-rwem.net

Targets

    • Target

      3da917fcd4dec06abb2dcb7d01e843dd

    • Size

      946KB

    • MD5

      3da917fcd4dec06abb2dcb7d01e843dd

    • SHA1

      e8f6eba225af1cb200314c75b1a8607a0da0c84e

    • SHA256

      b1a3032124a536928ee9eddfef722df3a881b4a656c76324445327420b50f1ae

    • SHA512

      d345877358dd68dd47da21e63208ff61734798fb7b77ee4ec43cb6a6412da3199db7064a444dc3fbd22f7953a337c2325677be64ed09f109c564f70bf7abf288

    • SSDEEP

      24576:4m5AcK8C0uPJXcvOLZHphAN+gFnTJJt7p:PlKnXcmLZHPAN9ZTvpp

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks