General

  • Target

    469a72800277832b6861e5ca5119e5719ece7a09bee33d96292f81a06023ee8a

  • Size

    435KB

  • Sample

    240902-ee6w9ssaqb

  • MD5

    d4d2fffc42de2f9b168d1e93d0071c43

  • SHA1

    c21e41f66959501f279f3792a4cf79e677433e37

  • SHA256

    469a72800277832b6861e5ca5119e5719ece7a09bee33d96292f81a06023ee8a

  • SHA512

    ec3896dd06612c06726f5e28fb191e63db61c8e00ef7f66bdbaa686ea515253b9116ee7126edf77c1cfd3a8100f7e1cc1cc9d69fe14d512dd327021123df384c

  • SSDEEP

    6144:M9JxcUmQgAPLzUfFUlakZZlXV5VNRZGT+a53ZnsIu4GyR2iBR1SuVp2M:6r8APckakZR5ziT+a3nsIOyR2iT17

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

9bwn

Decoy

italiancoastal.com

shareandfit.com

ibexacademia.com

guejek.com

vitalbizdev.com

connemaracomputers.com

surf-livre.com

styleforwoman.com

costcopaysecure.com

kingdomandqueendom.com

www-societegenerale.com

radiokerbfm.com

marylandstars.net

thechampionsday.com

beertenderb95.com

iybbshop.com

maglex.info

vh3g.asia

zaairobot.online

ryderhydros.com

Targets

    • Target

      469a72800277832b6861e5ca5119e5719ece7a09bee33d96292f81a06023ee8a

    • Size

      435KB

    • MD5

      d4d2fffc42de2f9b168d1e93d0071c43

    • SHA1

      c21e41f66959501f279f3792a4cf79e677433e37

    • SHA256

      469a72800277832b6861e5ca5119e5719ece7a09bee33d96292f81a06023ee8a

    • SHA512

      ec3896dd06612c06726f5e28fb191e63db61c8e00ef7f66bdbaa686ea515253b9116ee7126edf77c1cfd3a8100f7e1cc1cc9d69fe14d512dd327021123df384c

    • SSDEEP

      6144:M9JxcUmQgAPLzUfFUlakZZlXV5VNRZGT+a53ZnsIu4GyR2iBR1SuVp2M:6r8APckakZR5ziT+a3nsIOyR2iT17

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks