General

  • Target

    a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c

  • Size

    619KB

  • Sample

    241121-y9al4axkbv

  • MD5

    195ba9b47899890aa692102ce46fdf60

  • SHA1

    6ec9de21caa418a57b71de73434fb1b1be2037e3

  • SHA256

    a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c

  • SHA512

    c01db4b34635b24a7d482acbbfd644eb0d79e662e996511455df69af34aedb74ef13632354ab53ecce525bfacdafa6a43d19344e3e6067073eeb3afb54cf43ae

  • SSDEEP

    12288:NqvGzwkUwuxWzwD9lIXImq4HcwcM3ax69AZaPMC8Yg:NqvddW8DQQYqxT

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

hf9j

Decoy

afrifarmgroup.com

coffeeassiciation.com

unlimit-ed.com

guy.rest

dnemperor.com

ringstorule.com

reelnasty.com

travelgleam.com

sagestyleresale.com

jiaoyizhuan.club

fastred.biz

xn--fiqs8srv0ahj5a.xn--czru2d

eden-foundation.com

exquisite-epoxy-systems.com

luxurycaroffer.com

sdffzc.com

suvsdealsonlinesearchdusorg.com

weihaits.com

fetch-us-mtg-refi.zone

uterinevmkvhm.online

Targets

    • Target

      a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c

    • Size

      619KB

    • MD5

      195ba9b47899890aa692102ce46fdf60

    • SHA1

      6ec9de21caa418a57b71de73434fb1b1be2037e3

    • SHA256

      a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c

    • SHA512

      c01db4b34635b24a7d482acbbfd644eb0d79e662e996511455df69af34aedb74ef13632354ab53ecce525bfacdafa6a43d19344e3e6067073eeb3afb54cf43ae

    • SSDEEP

      12288:NqvGzwkUwuxWzwD9lIXImq4HcwcM3ax69AZaPMC8Yg:NqvddW8DQQYqxT

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks