General

  • Target

    dfw32m3

  • Size

    670KB

  • Sample

    240401-xq39madb93

  • MD5

    7806c7cd317fabbc77985b247167e596

  • SHA1

    c269abf7258da4ee6481dae3c19d3b7a58b7f4ea

  • SHA256

    b9b0ce10496a723998fd40bd2662d231e6135c465000d319b708736570d0bd09

  • SHA512

    72e8d0ea6d8e53ed6faa481bde97277c41afff210ee7f09ef2acc5e3437969bbbe896d0c7d528d66ccd621b692dc136b52ecebaaf83d3e719d4c0a9f90f58b15

  • SSDEEP

    12288:dshv3Ui0qubGxBeD9/PJ1w30mtp3We7CdPyW:i/UibuHZgpGe+dP

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pfrp

Decoy

aodesai.store

sultrymilfs.com

gratisratio.com

syntheticloot.net

imnntomen.xyz

fantacyfreshwaterfishing.com

onesolutionasia.com

xn--laufgefhl-bocholt-82b.com

hausense.quest

broncomall.com

ioewur.xyz

wilsontennis.store

eleditorplatense.com

windowcompanynaperville.com

azuremodule.com

letziexpress.com

idtbc.com

herbalshishaflower.com

basementdwellersnft.com

28686ay.com

Targets

    • Target

      dfw32m3

    • Size

      670KB

    • MD5

      7806c7cd317fabbc77985b247167e596

    • SHA1

      c269abf7258da4ee6481dae3c19d3b7a58b7f4ea

    • SHA256

      b9b0ce10496a723998fd40bd2662d231e6135c465000d319b708736570d0bd09

    • SHA512

      72e8d0ea6d8e53ed6faa481bde97277c41afff210ee7f09ef2acc5e3437969bbbe896d0c7d528d66ccd621b692dc136b52ecebaaf83d3e719d4c0a9f90f58b15

    • SSDEEP

      12288:dshv3Ui0qubGxBeD9/PJ1w30mtp3We7CdPyW:i/UibuHZgpGe+dP

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks