General

  • Target

    bc2363c6249e1d210a16e325e22950c70d23c98405791d51cd71b2d6e26a355d

  • Size

    624KB

  • Sample

    241121-ysawjazreq

  • MD5

    fd1dd9e320b4a17b1cd0fcdd9b7e149c

  • SHA1

    971a4372d26da8bc195177d8dd9a02356a7c8a9c

  • SHA256

    bc2363c6249e1d210a16e325e22950c70d23c98405791d51cd71b2d6e26a355d

  • SHA512

    a292b77b99bea1c679e43943ca5bc42ec5dcb6825d0834402a2d012f740f09928cdb24744667b6132cbe5e9612aeeaaf0543753aea5473911403426642c268f6

  • SSDEEP

    12288:qC+ypadGKJBdTv+5xCqPUe+6EKxziLzoJI3fvYBIKDnI1x:L+ypIRzBv4jsJ2ULzoJI3fvwIKg

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      bc2363c6249e1d210a16e325e22950c70d23c98405791d51cd71b2d6e26a355d

    • Size

      624KB

    • MD5

      fd1dd9e320b4a17b1cd0fcdd9b7e149c

    • SHA1

      971a4372d26da8bc195177d8dd9a02356a7c8a9c

    • SHA256

      bc2363c6249e1d210a16e325e22950c70d23c98405791d51cd71b2d6e26a355d

    • SHA512

      a292b77b99bea1c679e43943ca5bc42ec5dcb6825d0834402a2d012f740f09928cdb24744667b6132cbe5e9612aeeaaf0543753aea5473911403426642c268f6

    • SSDEEP

      12288:qC+ypadGKJBdTv+5xCqPUe+6EKxziLzoJI3fvYBIKDnI1x:L+ypIRzBv4jsJ2ULzoJI3fvwIKg

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks