General

  • Target

    aadb75ee85117dbd3cfd63f250f7f6535435d327bf5a5c18fca22cee3123b118

  • Size

    375KB

  • Sample

    241121-yryafawmbs

  • MD5

    314c10962c3124c82a9f184662a4be8b

  • SHA1

    f1eae46936c0a042c5665024424c695b28eda562

  • SHA256

    aadb75ee85117dbd3cfd63f250f7f6535435d327bf5a5c18fca22cee3123b118

  • SHA512

    9db307abb50fe4007b2dbfbef5d3a5f545dfb60ab2c139f766464aa894c7eae73ca7c15927082467eb70e1f45bc317c8601e91eb6937f5d4dc69fc64d5a389d3

  • SSDEEP

    6144:PC/myjWljXeTtxhqRtjrEtirxCpHI3tZkhOb2EHqGGJIAer+oTmVvY5gZmcSJIFp:5qejuZxh8JrxCpo3tZ6yK7Ler1lkSJIj

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

xc52

Decoy

koebnertriangle.com

maltbahis74.com

invisionment.com

buzzcupid.com

portavellarestaurant.com

vegan-mexican.com

magotan100.com

focalpatio.com

teammissouri.club

marketplacejoy.com

cxz6.com

bettersalud.info

viesereine.net

neondashboard.com

linuxsauce.net

samuelcollie.com

lavishlylashed.net

gosseinsag.com

isaeitaly.com

mediakal-sa.net

Targets

    • Target

      WTS-SOA OCT21_pdf.exe

    • Size

      541KB

    • MD5

      3591900fe0a5aa6d4aa7333dd8fa2087

    • SHA1

      6ad19947aaa288adba42f0ef78da4679a713634d

    • SHA256

      1dd7df2847fe97dcf3a982796de329170823badae79b8342d5180ed5a11633ba

    • SHA512

      fa0cab7da77825c50dc5963d505fe7aceb8ace8f7236190086488b81643a81a6c9b156a90e8045533c421b81175dbed7d583f28d61caa144fab61e9ab350bb5a

    • SSDEEP

      12288:O78H1X++lTldtyhZ1g+KqRfoCoE40BhwFpCke:t+KT6Zajcon+gpCke

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks