General

  • Target

    ae74b8c9e1f56b45a7cd04935a720d3bb42a5e58d257a648474c89def6b54a01.exe

  • Size

    237KB

  • Sample

    240911-bwtrgsvfqr

  • MD5

    5bac332642f907ed254f85c6b60fa79d

  • SHA1

    75a9bef69eb70ae57d7d8735ece203a97f37950e

  • SHA256

    ae74b8c9e1f56b45a7cd04935a720d3bb42a5e58d257a648474c89def6b54a01

  • SHA512

    8017043cfceba71ad9e42f5bd684e922a16134e023ae84de60fd4a0c94f07e27202e1f0de6a871f907fbb0566d5f38542a0babda6e2e488e3bd38d5bb9e2c6e6

  • SSDEEP

    6144:DOmkNEhXdfslyuJPEXyiaKTrz+MJSz19M90U8x:iaXsAu1EXyvUPJS9MGx

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

tqug

Decoy

sns138.com

hiddenevents.us

plantandseedswap.com

ayomvp.com

buildoaxaca.com

pkxshopingit.website

youdoyoutoys.com

n-musicoffice.com

sushi-yoneki.com

towardstech.com

jerrilynnfike.com

fxivcama.com

202206.com

energrove.com

nohonet.com

deta.group

kristenajohnson.com

russodevleopment.com

liine.me

hiegi.icu

Targets

    • Target

      ae74b8c9e1f56b45a7cd04935a720d3bb42a5e58d257a648474c89def6b54a01.exe

    • Size

      237KB

    • MD5

      5bac332642f907ed254f85c6b60fa79d

    • SHA1

      75a9bef69eb70ae57d7d8735ece203a97f37950e

    • SHA256

      ae74b8c9e1f56b45a7cd04935a720d3bb42a5e58d257a648474c89def6b54a01

    • SHA512

      8017043cfceba71ad9e42f5bd684e922a16134e023ae84de60fd4a0c94f07e27202e1f0de6a871f907fbb0566d5f38542a0babda6e2e488e3bd38d5bb9e2c6e6

    • SSDEEP

      6144:DOmkNEhXdfslyuJPEXyiaKTrz+MJSz19M90U8x:iaXsAu1EXyvUPJS9MGx

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks