General

  • Target

    57a6406937efbc6179b63b77404f9bc1

  • Size

    983KB

  • Sample

    240113-b3pq4sade5

  • MD5

    57a6406937efbc6179b63b77404f9bc1

  • SHA1

    0472e9401fe3684634dc33b039bc1b918ac22328

  • SHA256

    fbe3eac8deb8b145ad8ac555e27cef7d1fad66d2472f2a36a7d944cb11702520

  • SHA512

    752c686a4668f505f43a9e6fb369c565f6cb881d20f71bbecec8424136f44da808550bdf9bc560fda52265e7692411e2ab84cf1ababb6ad93ba3feb3159e686f

  • SSDEEP

    12288:x9zNOtE+7S57StDc9F3nC0Py3gAhOKcRqHWm7qSIOXgO7Db3hLNKc/A3LK+MFrqc:xIpb8hyNfb3RocY3XEs054fFFEyjGvd

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      57a6406937efbc6179b63b77404f9bc1

    • Size

      983KB

    • MD5

      57a6406937efbc6179b63b77404f9bc1

    • SHA1

      0472e9401fe3684634dc33b039bc1b918ac22328

    • SHA256

      fbe3eac8deb8b145ad8ac555e27cef7d1fad66d2472f2a36a7d944cb11702520

    • SHA512

      752c686a4668f505f43a9e6fb369c565f6cb881d20f71bbecec8424136f44da808550bdf9bc560fda52265e7692411e2ab84cf1ababb6ad93ba3feb3159e686f

    • SSDEEP

      12288:x9zNOtE+7S57StDc9F3nC0Py3gAhOKcRqHWm7qSIOXgO7Db3hLNKc/A3LK+MFrqc:xIpb8hyNfb3RocY3XEs054fFFEyjGvd

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks