General

  • Target

    4d44d59167c438427c402149dc11f8ad

  • Size

    781KB

  • Sample

    240109-egf4maeefp

  • MD5

    4d44d59167c438427c402149dc11f8ad

  • SHA1

    f4ee7a4b2ed54a47eb01ba0f8de8457e0f91bb81

  • SHA256

    f6d07600ad2883462e18b94c06aabda3a2741fe8179c34d0befacaa4bd62a655

  • SHA512

    acfcc882883de135e0b803d47abcdc05e53d7b97cc5f7e0d927b9669c7e44f5118a27d08d855a7e2b2b1216bf750dc46614fd9f48c090cd24c7ab50dd5e6f786

  • SSDEEP

    12288:jwBe93OmzU2ai6D3h0kaHHMbuG0fEXj8l2hh/khmw0t8:PZai6Dban2zC2hldwh

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

nwru

Decoy

zjkhyo.com

mogreener.com

galanpresente.com

anthologistliving.com

jfl-info.net

cascobaycuttlerly.com

nefertityeg.com

greatescapefurniture.com

primulashop.com

xn--cittinrete-k4a.com

drugstoire.com

kefaloniabride.com

viralgenstudents.com

makerwl.com

rubyweed.com

badenio.com

smartcontracttraders.com

lcscards-veilig.icu

qf553.com

dnhsxm.com

Targets

    • Target

      4d44d59167c438427c402149dc11f8ad

    • Size

      781KB

    • MD5

      4d44d59167c438427c402149dc11f8ad

    • SHA1

      f4ee7a4b2ed54a47eb01ba0f8de8457e0f91bb81

    • SHA256

      f6d07600ad2883462e18b94c06aabda3a2741fe8179c34d0befacaa4bd62a655

    • SHA512

      acfcc882883de135e0b803d47abcdc05e53d7b97cc5f7e0d927b9669c7e44f5118a27d08d855a7e2b2b1216bf750dc46614fd9f48c090cd24c7ab50dd5e6f786

    • SSDEEP

      12288:jwBe93OmzU2ai6D3h0kaHHMbuG0fEXj8l2hh/khmw0t8:PZai6Dban2zC2hldwh

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks