General

  • Target

    d4408712c45b6060596f9174cf537c3a0d7b65e8d0e9cce808be8d8e3bce0823

  • Size

    673KB

  • Sample

    241121-y4kvwa1nan

  • MD5

    598bc28ef31375d1fe4b106025eada10

  • SHA1

    8f020451fac0e254de69fb4f1288fff57a847bfb

  • SHA256

    d4408712c45b6060596f9174cf537c3a0d7b65e8d0e9cce808be8d8e3bce0823

  • SHA512

    5ad8593d1f23afd84005f787db5823460760f61507eefbf5709411219a8f573544b1bf6498a506db19ba54534cc21fda3e0f8934a575f7d174d769c5f91fd7f4

  • SSDEEP

    12288:44sLgsQkfAJBslaZlNsv8aMMreVOdbyDhXdPSXmStlOuRnyyQ:44xEfKyla2Ocy9lJ0OuRC

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

i9ng

Decoy

guiadesfralde.online

asjcjm.com

peacefmradio.com

pastasteakandpancake.online

imas-millionlive.com

ori-key.com

emissiontestrepair.com

education-mentor.online

axieinfinity-airdrop.club

iphone13pro.photos

grjeht033.store

plainfiles.com

texasinjurytriallawyers.com

votebrenthagenbuch.com

xn--crahome-cya.com

lquzd.com

anwoguoji.com

tacdating.com

shop-mr.com

pandrwatch.store

Targets

    • Target

      363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e

    • Size

      1.3MB

    • MD5

      c192b7fb3ae63a02b73945b859c81f09

    • SHA1

      a164f5a15d1ade8139dfcb1ae70e8f4a55a24a1e

    • SHA256

      363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e

    • SHA512

      d82936a57910b1426018d3ecd0282b2f7d7c7c2942df666103724b8dbf4378d5750c5512d38c0f8db6afd3bd4b7386d80155d92100d452a6cf5dbc6b57e7e209

    • SSDEEP

      12288:tvdDddDYvvKUcrZasvXR/S9mK8tKkgaJ8X3Z2g2fmS45Uy7how4X24IEiEmU4Mul:bxGvvKUPKR/ImKn7wqaUkwJ4+uYC/Z

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks