General

  • Target

    4603e9b4de577e9a750d57694f79b502c0eacb9c154bc0a874a39056727a27e1

  • Size

    513KB

  • Sample

    241121-y37y1s1mhk

  • MD5

    be8561c2ed7de8e785d2c5b60eb3718e

  • SHA1

    661759e1b4e61bfe2276b49a023fba1cb5de3b85

  • SHA256

    4603e9b4de577e9a750d57694f79b502c0eacb9c154bc0a874a39056727a27e1

  • SHA512

    f5bdf65b43ad9dc2f3c5febb86507be6112f3432c6425527b622aea98586b0e544ff1562dc3afe73c6ae09c28cdc5dbf195bf1ed722666311fb7fd544ce279b7

  • SSDEEP

    12288:BhGJDGl8yGHUataSpCMIlkm3Pr5OPF6DxyuAo2TPiRJYNk5v2dOK:OC8LUkIMIxdO4DQux2TPWYS5edOK

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

yig8

Decoy

lifecallingbootcamp.com

atlantamobilethaibodywork.com

pear-works.com

ffmagic.com

thenewivhubboston.com

bemusedwsettr.top

beausoutdoors.net

tminus-10.com

pinnacle-legal-services.com

maralgroups.com

easywhiff.com

dentalimplantspracticesbcan.com

monokrom.art

fadak-njf.com

eco1tnpasumo5.xyz

gites-cougousse.com

pittsburgheyecare.com

acami.art

highlow-bnr.info

azienda-agricola-stellino.com

Targets

    • Target

      DCC_PO001070322.exe

    • Size

      831KB

    • MD5

      3fcf09742679131c0e4a202b27503a5b

    • SHA1

      89a9926ffa6e44f4a38ea5a6f5ea768d29be0715

    • SHA256

      2710360c68d0074ff1ec1eae99a680106bd6076b2602ad94025bdeb5b2779da0

    • SHA512

      3342ec3a1a80872937d3d71145ad8f0e4d830f6dca69890c985081fb9b876319637c7a0cc63d7db2bbe9e3dc038385482171b483ce64f61527367755b8eb2f3b

    • SSDEEP

      12288:Z/xpFtK4DZFUswOeoQeuNNZz0PytzIx3GPvibvUWORFkS41a6EAmD:9vFtKKZcvo0z/9Ix2XibvlTa6

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks