General

  • Target

    5d5d3759e3350abef81021ccf0af5932de24d1e04b93342906f6f86d023ed871

  • Size

    679KB

  • Sample

    241121-y6agxswrhw

  • MD5

    f7b73947f96e3c34620f829256aca4d9

  • SHA1

    fec6158936bda16f2a3cdb56d7dcbca2f291836c

  • SHA256

    5d5d3759e3350abef81021ccf0af5932de24d1e04b93342906f6f86d023ed871

  • SHA512

    8e3a616fc53be2ab0d6b57242220f2d6011cc7887c2b9846addbcb1234cd6b2aebe3d9047e1cbfad1d0b97e5f86f9659f8d189314a1859a8acf16636ebb4d2b6

  • SSDEEP

    12288:WrCvT3lHeDXPYCMU1NvV5YOyw+niSeQHtmmLDRi0mdAAIQOyfM7i2ylAMOqTh1RL:WyVebPYCMU1NvUw+2QNmKDYeGf9plXHd

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n7ad

Decoy

orchardevent.com

inthebeginningshop.com

keodm.com

hangthejury.com

cannabisllp.com

letsratethis.com

milanfashionperu.com

adcvip.com

professionalcprclasses.com

checkmytradesmanswork.com

sloanksmith.com

apnajamshedpur.com

665448.com

zryld.com

cabot.city

graet.design

furbabiesandflowers.com

silkisensations.com

sawubonastore.com

screenwinz18.com

Targets

    • Target

      fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin

    • Size

      728KB

    • MD5

      64af41000584694858d0fcc37b1bf69b

    • SHA1

      707c77c61fafdd736c1e02bfdbc8ce7ce24cc759

    • SHA256

      fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa

    • SHA512

      dff4927081ff280eb4e707660c596adfbf8ada0f02cdbf8dd2414cb368b8036708558e854b892eda7dc0049c11df6ff1044cb0ec7c9ae9a32851ba3790fd7177

    • SSDEEP

      12288:xEPgph+pOidPx8aabrfIdyI8xejcPpjTp0tN8z4b5sT762uM+42QK4UkegeIH3zS:+YepFPORrfIfeKcPpjdEWGO76SIuUkqZ

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks