General

  • Target

    38dc6496f79d8b2be723b6285c5bf3725d07a837dcd0d8ec339428f9177c1045

  • Size

    879KB

  • Sample

    241117-esxwhs1dkg

  • MD5

    f58fb03057ddaa00cb0e46d7d0241589

  • SHA1

    088280f1e9c3fb51bebe03ee4767936a5ff5fb0e

  • SHA256

    38dc6496f79d8b2be723b6285c5bf3725d07a837dcd0d8ec339428f9177c1045

  • SHA512

    4c5f0974151a578ee2e1007c2ac64e5e60d7e9bcd746a7343a5e7ef0a7239916409dfd1a1607661e25c813de84388dd6b2504febf28bf5e85d7d0b7b210a6a1a

  • SSDEEP

    12288:9/cIIK2eES2R08gkS/m5Xk6JabFu6PxdoYFpzQBcYml6VZQNBZIKUPke:9HIVTngkkIXk6JguUdV0VCqCdIc

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

vu9b

Decoy

longdoggy.net

gylvs.com

evonnemccray.com

nicemoneymaker.com

baby-schutzen.com

xgahovzm.icu

psdcompany.com

makeupjunkiewholesale.com

vz357.com

carshownet.com

forneyus.com

nfoptic.com

lampacosmetiques.com

newmandu.com

localupdate.net

theartofmajur1.com

bancosecurity.website

cabinhealthy.com

tiprent.com

lloydwellsandassociates.com

Targets

    • Target

      38dc6496f79d8b2be723b6285c5bf3725d07a837dcd0d8ec339428f9177c1045

    • Size

      879KB

    • MD5

      f58fb03057ddaa00cb0e46d7d0241589

    • SHA1

      088280f1e9c3fb51bebe03ee4767936a5ff5fb0e

    • SHA256

      38dc6496f79d8b2be723b6285c5bf3725d07a837dcd0d8ec339428f9177c1045

    • SHA512

      4c5f0974151a578ee2e1007c2ac64e5e60d7e9bcd746a7343a5e7ef0a7239916409dfd1a1607661e25c813de84388dd6b2504febf28bf5e85d7d0b7b210a6a1a

    • SSDEEP

      12288:9/cIIK2eES2R08gkS/m5Xk6JabFu6PxdoYFpzQBcYml6VZQNBZIKUPke:9HIVTngkkIXk6JguUdV0VCqCdIc

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks