General

  • Target

    443cdabab07bf375f119a8c22e2114be

  • Size

    842KB

  • Sample

    240105-x1171sach7

  • MD5

    443cdabab07bf375f119a8c22e2114be

  • SHA1

    2e155cb516dd9071271785a3f991e9255929e4ac

  • SHA256

    a57f84d7e89cc76408c67fbcc2c8e3c03bf98a8daa93209f3650ebffa09faabb

  • SHA512

    e224471cfffadd1c68b190ec8600b95e34c5618c26b8b2dbb4d902028025957f2cc68d3acbb8b3768a9176a22c00bc70456b8caa978b837ead45cb36b7642cb9

  • SSDEEP

    12288:rgDc9F3nC0Py3gAhMa0L7Gyf0fQbN7CGfyCwgztRfVZiEm28cn4OvNG:rnnMf27o7afVZzBG

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      443cdabab07bf375f119a8c22e2114be

    • Size

      842KB

    • MD5

      443cdabab07bf375f119a8c22e2114be

    • SHA1

      2e155cb516dd9071271785a3f991e9255929e4ac

    • SHA256

      a57f84d7e89cc76408c67fbcc2c8e3c03bf98a8daa93209f3650ebffa09faabb

    • SHA512

      e224471cfffadd1c68b190ec8600b95e34c5618c26b8b2dbb4d902028025957f2cc68d3acbb8b3768a9176a22c00bc70456b8caa978b837ead45cb36b7642cb9

    • SSDEEP

      12288:rgDc9F3nC0Py3gAhMa0L7Gyf0fQbN7CGfyCwgztRfVZiEm28cn4OvNG:rnnMf27o7afVZzBG

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks