General

  • Target

    4b6d021cb11a5e8abb0ab28e1ae0f711

  • Size

    629KB

  • Sample

    240108-pj2hfsaef7

  • MD5

    4b6d021cb11a5e8abb0ab28e1ae0f711

  • SHA1

    337e975f7d0f214da025e0b7d5b749dbbfcb5756

  • SHA256

    9f64df73b619cd708696983b9eb2dea834a4e6bf62128e28adb4d8d7b2f8143f

  • SHA512

    99a48435584de988a007e89d2f08fa662fce19cec8971aa320571b4a61f0632177c080a7e1ce5dc4114294e95cf2a396c79429307229842d9946e05ebd19f4e3

  • SSDEEP

    12288:uqqv9wHM7iS/d348mtr1jCrS3yrm1pJp/P14F:u7wHPS/d3O5uSNhN4F

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      4b6d021cb11a5e8abb0ab28e1ae0f711

    • Size

      629KB

    • MD5

      4b6d021cb11a5e8abb0ab28e1ae0f711

    • SHA1

      337e975f7d0f214da025e0b7d5b749dbbfcb5756

    • SHA256

      9f64df73b619cd708696983b9eb2dea834a4e6bf62128e28adb4d8d7b2f8143f

    • SHA512

      99a48435584de988a007e89d2f08fa662fce19cec8971aa320571b4a61f0632177c080a7e1ce5dc4114294e95cf2a396c79429307229842d9946e05ebd19f4e3

    • SSDEEP

      12288:uqqv9wHM7iS/d348mtr1jCrS3yrm1pJp/P14F:u7wHPS/d3O5uSNhN4F

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks