General

  • Target

    f6da8480cbbc1d09ddcc010aa3c5c52f9dbc8a32cf0947f1ccc3df6165a70c57

  • Size

    329KB

  • Sample

    240902-bbpxssxgnc

  • MD5

    38cf61c8426f3a3f711ca75ba9751f3a

  • SHA1

    d4560059be873b9f4bc2a70238a600536ba3cb70

  • SHA256

    f6da8480cbbc1d09ddcc010aa3c5c52f9dbc8a32cf0947f1ccc3df6165a70c57

  • SHA512

    ae4c871e5e49e0aed396621f2c844ad889b8f1f3ba8171a87cf35a6e84bd7e7e3ac9f51d5a377ede3469203d44e149d94e8919332e6bfb2ec5624080845ef2f9

  • SSDEEP

    6144:Qm4WGSvKRPf3r1YsVvoAZhiwy2yMj48EA0c7eL4XktRJKCqjsbgICVE:VI3Csuwhzy2ZPE27ecXkWYbFCVE

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      49a344e5002bb1b35a0a5db1c82358c43de798acfd0192a88dc11245de163bd8

    • Size

      388KB

    • MD5

      b7e2519de2759907f645492f484c39fc

    • SHA1

      5b1de6f3a342c379b954383e641dd41b83db4b9d

    • SHA256

      49a344e5002bb1b35a0a5db1c82358c43de798acfd0192a88dc11245de163bd8

    • SHA512

      276bf9c2555e1431a8a66df2dafe317833341a99596ad5cbf0ec501489962163cb3cbeda7500c9c4316a8934d3559e500107407a47dcc15aaff31822c6145d4a

    • SSDEEP

      6144:eaihpGX8jPNLjBRwAoy8ApXA5JmeEzgaseiz/V1qYqrY:eljGX2PNLjBz/1AbmeEzSLnq8

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks