General

  • Target

    9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe

  • Size

    651KB

  • Sample

    240720-m22vtsscke

  • MD5

    f41074eaa3e27940c9659ed547264c46

  • SHA1

    b95ec335db31a00d2ec118afec3ff1a5885f93d4

  • SHA256

    9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6

  • SHA512

    65c8b8f2fb091725bf5ce52777882f325ef08c72ae9693bebdf45e9d65b46c6b36f6b59f36ab3b5ffd1325ec43c52df49f5afd78597bda4fc664642d5609a498

  • SSDEEP

    12288:2fBafvIKSe9qVlyQSRanh4cMVPzF62RIoDKbB38kjrhmlrFrncR:24f/R0VlyAh4DUoDKV38kjrUrF

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.7

Campaign

uem3

Decoy

darwinschools.com

polytherm-vloerverwarming.com

sinibelanja.website

erasemy.info

domainedelapoujade.info

freidaperry.com

ensoustudio.com

xjyjjy.com

ezhuilike.com

equipoheza.com

vtsr-health.com

elanagro.online

savas-jewelry.com

hispahoo.com

nlsc.chat

wharxl.icu

funandfoodboat.com

usdtsearch.com

experimentguardian.xyz

bikeell.com

Targets

    • Target

      9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe

    • Size

      651KB

    • MD5

      f41074eaa3e27940c9659ed547264c46

    • SHA1

      b95ec335db31a00d2ec118afec3ff1a5885f93d4

    • SHA256

      9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6

    • SHA512

      65c8b8f2fb091725bf5ce52777882f325ef08c72ae9693bebdf45e9d65b46c6b36f6b59f36ab3b5ffd1325ec43c52df49f5afd78597bda4fc664642d5609a498

    • SSDEEP

      12288:2fBafvIKSe9qVlyQSRanh4cMVPzF62RIoDKbB38kjrhmlrFrncR:24f/R0VlyAh4DUoDKV38kjrUrF

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks