General

  • Target

    ae60fb877b44fb7cae71fb5f57207aa0

  • Size

    851KB

  • Sample

    240229-nccp3sfb7s

  • MD5

    ae60fb877b44fb7cae71fb5f57207aa0

  • SHA1

    7b3e167a838b09e52af62ba99c0702a150ea6f94

  • SHA256

    f5f438857e1d75cd3a0c7c8d8fde494ec31705db16f19e3d026d9f09e503fbf5

  • SHA512

    489df49eb64880e4990c0a679502fabf7ee1637bf2fe92ce8a3f1e10891b0ff56ac95775194d749d385150947fda47a76780bb577f52f1c3831062159a7e6570

  • SSDEEP

    24576:ioR6qgmswwE1p80qdg1+81OM8fEj1zUgSLFWPZy2:hsKbY0qds+sOI1IguFuy

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n8ba

Decoy

thefitflect.com

anytourist.com

blggz.xyz

ascope.club

obyeboss.com

braun-mathematik.online

mtsnurulislamsby.com

jwpropertiestn.com

animalds.com

cunerier.com

sillysocklife.com

shopliyonamaaghin.net

theredcymbalsco.com

lostbikeproject.com

ryggoqlmga.club

realestatetriggers.com

luvlauricephotography.com

cheesehome.cloud

5fashionfix.net

wata-6-rwem.net

Targets

    • Target

      ae60fb877b44fb7cae71fb5f57207aa0

    • Size

      851KB

    • MD5

      ae60fb877b44fb7cae71fb5f57207aa0

    • SHA1

      7b3e167a838b09e52af62ba99c0702a150ea6f94

    • SHA256

      f5f438857e1d75cd3a0c7c8d8fde494ec31705db16f19e3d026d9f09e503fbf5

    • SHA512

      489df49eb64880e4990c0a679502fabf7ee1637bf2fe92ce8a3f1e10891b0ff56ac95775194d749d385150947fda47a76780bb577f52f1c3831062159a7e6570

    • SSDEEP

      24576:ioR6qgmswwE1p80qdg1+81OM8fEj1zUgSLFWPZy2:hsKbY0qds+sOI1IguFuy

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks