General

  • Target

    c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe

  • Size

    490KB

  • Sample

    241120-1vwxwstrav

  • MD5

    6b5c151262e7e04e414579b38108a1d1

  • SHA1

    f151bd3fb1cae8e597f8341e381be15ef7154b04

  • SHA256

    c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5

  • SHA512

    11644469db984f4afbd6eeb320f2a4a6893b96eb864b20233bc115209d9e83dbb61eef25311bce92146731bf0109ccc627698944b74f13b06a0ce7eec8d07fea

  • SSDEEP

    6144:1GxhLwIa+v2TgTxWyYZW2uPxJgpjt61mAKc4WzJCZNozJztmz:0ftwgTx2W2upJgVmBKuzggtmz

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

n8cr

Decoy

mainponsel.com

twdesignacreation.com

obsidianfields.net

biologik.education

australianmeatandwine.com

metaverse360.biz

tenlog034.xyz

retryb.com

darbodrum.com

ouranos.xyz

equityreleaseshelpukweb.com

buck100.com

cfip-plongee.com

sundindustrial.com

godigitalwithpavitra.com

exodiguis.com

ncxogt.com

medyncity.store

bseafacepharma.online

dellmoor.com

Targets

    • Target

      c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe

    • Size

      490KB

    • MD5

      6b5c151262e7e04e414579b38108a1d1

    • SHA1

      f151bd3fb1cae8e597f8341e381be15ef7154b04

    • SHA256

      c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5

    • SHA512

      11644469db984f4afbd6eeb320f2a4a6893b96eb864b20233bc115209d9e83dbb61eef25311bce92146731bf0109ccc627698944b74f13b06a0ce7eec8d07fea

    • SSDEEP

      6144:1GxhLwIa+v2TgTxWyYZW2uPxJgpjt61mAKc4WzJCZNozJztmz:0ftwgTx2W2upJgVmBKuzggtmz

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks