General

  • Target

    3ef8a7afe57661dd8be0d7c3d1e3f9ba

  • Size

    716KB

  • Sample

    240103-yztbfshger

  • MD5

    3ef8a7afe57661dd8be0d7c3d1e3f9ba

  • SHA1

    10e0b629aa7c9716fd52f6d356fe0c4e3b522dba

  • SHA256

    1e465b759dc6a6ba3993eb61557f5e7740744f1d9ca55f0a185d1ea4d8b8e30b

  • SHA512

    f75be94c80add664ce25bbb88432693d5c0fe8ebd378e39e80019ba87395e8215643e214ee97f68744ce020fc277af9ef3ea40a1c5f3c2afdf8e99ce630b6fb9

  • SSDEEP

    12288:8ZdH7iS/d348bV8/qiU73rQ3l7/ptDlEoN82HARksyXfABN/pOTdoKHtS1jxTlE:EsS/d33AS7385FEoy/byPEN/oT2PjVlE

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      3ef8a7afe57661dd8be0d7c3d1e3f9ba

    • Size

      716KB

    • MD5

      3ef8a7afe57661dd8be0d7c3d1e3f9ba

    • SHA1

      10e0b629aa7c9716fd52f6d356fe0c4e3b522dba

    • SHA256

      1e465b759dc6a6ba3993eb61557f5e7740744f1d9ca55f0a185d1ea4d8b8e30b

    • SHA512

      f75be94c80add664ce25bbb88432693d5c0fe8ebd378e39e80019ba87395e8215643e214ee97f68744ce020fc277af9ef3ea40a1c5f3c2afdf8e99ce630b6fb9

    • SSDEEP

      12288:8ZdH7iS/d348bV8/qiU73rQ3l7/ptDlEoN82HARksyXfABN/pOTdoKHtS1jxTlE:EsS/d33AS7385FEoy/byPEN/oT2PjVlE

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks