General

  • Target

    c9c2209dc55b04e1d61d419f1762e95c

  • Size

    291KB

  • Sample

    240314-18rv4aah67

  • MD5

    c9c2209dc55b04e1d61d419f1762e95c

  • SHA1

    c8f8fcd21983f68b3bf5644bd5801805fd7f010e

  • SHA256

    db61ad0a65716a3d1d5f2230a65d9fd76eb04e291f293385f25d34b0633aace4

  • SHA512

    70edc9372d5d7cd4038d35244faefd68093683a06fe45ce6aa41f34e65e9c6739b528ddd6cdcb0986bc2a748ced0bbfdcdb536daea119398dbeec9968f6346d5

  • SSDEEP

    6144:SjRK0Gx6tz3D8NYPWBPobrU9fblmkH9pMJib13BtqYcEDK3voz:SY0GKz8NYOBPhskdpMJib1xk3voz

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

mabs

Decoy

joiderqm.com

hyc306.com

ouchplus.asia

abrosnm3.com

hospitalanti-infectives.com

ala-co.com

morrisonltts.net

tradingimpulse.com

invisibleimagination.com

jdjshop.com

huntedby.com

szsgfdzx.com

germfightersusaiowa.com

pahaadpost.com

obrankers.com

plaeralum.com

getfitwithmeministry.com

smartswaploan.com

gypsyjewelrydesigns.com

meetgoodwill.info

Targets

    • Target

      raw.exe

    • Size

      224KB

    • MD5

      f5fa2e043b901e50f0e6e8ad0e4f7074

    • SHA1

      221c67c606a3a2e0c5bfa8b57d7c749e29b074d8

    • SHA256

      4938b1c8ca1745b33ea6adc31b39e2003646370ec7f52fe1e89af6903a69aaca

    • SHA512

      3d779d6b1ee667a27cf124d41397496620920a7e0544f8fe143e2ab6170148f2c9d6a0f05cef2528827cde20d03c99407d06f4e9a39db13bcb8984ab73ce7dd6

    • SSDEEP

      3072:vd+7xl60FFPbkGF+7IFNj84EvodYVnHkgZL1P/7aJ3NrXWPsZa4FSUqcUKZrVU:lOhpblSi/I991P/7aTzna4zqaVU

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks