General

  • Target

    16c7ab46f5e4931cdefb3b1d8f68da319ab955660bf9bc390f2755a7f410dd23

  • Size

    535KB

  • Sample

    241121-zb1lasxlbx

  • MD5

    7dc803c4f09779607035e820c2f3835a

  • SHA1

    3f878ce8fdca8a1ceffeb618459f6c17a7660ed6

  • SHA256

    16c7ab46f5e4931cdefb3b1d8f68da319ab955660bf9bc390f2755a7f410dd23

  • SHA512

    753fa69821d984d2809f68afd7e26fff02e5c51337ef0fc4e81c90381965a1e2e1c5cc7f4f449b8b1346d810ee6ff9469c39dfe6058a8c930eabfa49cf077fe5

  • SSDEEP

    12288:3Hu7P2EL5uvYa9polISNZFHKpptTkyND/rj+b:3u7+suYajolISspptTHNvSb

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

inga

Decoy

21sq.xyz

aleimanpaper.com

soulworkerrush.com

lianxiwan.xyz

gorastionse.store

nuhuo333.xyz

greenft.xyz

upisout.com

mgav23.xyz

2day-recv.info

emdestak.com

generatorgmer.xyz

inmyhindi.com

meenubhosale.com

feinquebrantabledoc.com

valgtrizoma.quest

impqtantaou.com

nomorewarnow.com

gmcrjizppcx.mobi

eludice.net

Targets

    • Target

      Order 4566789.exe

    • Size

      838KB

    • MD5

      2d9ded5e11d7f45bf9f534b7257b1759

    • SHA1

      98dc535995c9cf3eb2b448b313e738dd3cfe9da8

    • SHA256

      44642b64aeb3a5366b70e88c307e938aefb25fea2e6f5a5520c8829f19552f9c

    • SHA512

      4d25c22e478a6fae64f147a973a12911148ce408f429f3444df433ecd71fb516495bd717a65b07cc33eade85221d309b7d763d83f45c6fd70c1876d496953d45

    • SSDEEP

      12288:lg8edcf0v6QWTSG1A8FVxlrNStv8Q7BHe40p6pmAupZCmH6hTcWDpMoaU7yo4LPi:lgv6QWTz1dPSt0QFH0KmAum

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks