General

  • Target

    b0eacb6921e777d610f2fe95b63cc7b3cbe0ce5027f1b36375f85ffd3515cb77

  • Size

    328KB

  • Sample

    240904-vp7vbavfpf

  • MD5

    d1ee89a5dc7634ec7c02076f86f9303c

  • SHA1

    f926b88a0cb57d05c5def6ee9e79f837f3caba57

  • SHA256

    b0eacb6921e777d610f2fe95b63cc7b3cbe0ce5027f1b36375f85ffd3515cb77

  • SHA512

    1902fd5fad73980de0d66efe270eee50292292e822dad49665125902e6c25fb4d99a6e3173ca2b7e1adc77941b6d907831cf9ac140adf80afc65151f58b86958

  • SSDEEP

    6144:PrNYzBjnOCn9V/yTKMw4tAnbS5G/jMDkan5NxYOsf9TbNy+sa2tqCykbE0:PrOzlnOCn94TKMw42nbS5rD/Nyv9301P

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      c8e543607841185cc38e8b2c4150d4fa9d14bd54fbd2cd43cc256485aae62ef8

    • Size

      373KB

    • MD5

      1f42843d965171d657fc251a18e79937

    • SHA1

      2790bb065af77a4d2857c58188ced3046b74940f

    • SHA256

      c8e543607841185cc38e8b2c4150d4fa9d14bd54fbd2cd43cc256485aae62ef8

    • SHA512

      2d9326741591dc2e2feebd6f5c60be1ae86688e832090b4f1c777173e790a6bacbd908c229495975962a2bea62b78a28cc8f8ece5546a3acc653303c38ed9d06

    • SSDEEP

      6144:bjaohYpyMkhBTJKLDW5dhpTTsdXJWqAIdYrSLdal3tUC80o+cCBtQsIAUVruc:PaoYSBTJnhpUdZbverSxtC8Tc6uIic

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks