General

  • Target

    b948e037220c1131b8c44bc4a26c34f5d2f3a6db8824bdcd73e1c845594dc7e0

  • Size

    384KB

  • Sample

    241121-zcs8lsxld1

  • MD5

    14c29565e0f22f313fe76bd815f3cfc6

  • SHA1

    1b9052112562550e524a6fb57955d02af117bfba

  • SHA256

    b948e037220c1131b8c44bc4a26c34f5d2f3a6db8824bdcd73e1c845594dc7e0

  • SHA512

    b27140315fdc459a3636d470c727c1d3996b02b2283fe76498cc9853535eeea75eea1dfe2d52e56b0a364b9ddf797abd269b5da5d10ebcf64789e555bb652733

  • SSDEEP

    12288:nQ1nZXu/c7hF/yHuBj7IgEFqTSpnWLivIl62I8:GZ+kH/yONIcu+62I8

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

me2z

Decoy

rampdauto.com

noriharte.com

harborfreightcreditcard.com

tktspyhwz.icu

cagehosting.com

hgfte.club

fullnessspa.com

link-repair.com

rrjyds.com

edevletdestekcardmerkez.com

sprayingmachines.com

janerowenlester.com

velocityworkflow.com

kcrm.computer

kjbubeng.com

virtualhockeyconference.com

trugrits.com

creativesociallight.com

dnaswabtesting.com

willpool.com

Targets

    • Target

      PROFORMA_INVOICE_pdf.exe

    • Size

      761KB

    • MD5

      66dd27da37cdd67246a447220949d943

    • SHA1

      9158ff8fa1c879152487665c0dc37e8d6c91b00d

    • SHA256

      eb20acaf619f8bec9cf1e1353600b3825744b86b0a4281a299efefeb91b93c35

    • SHA512

      98f2a3e56eeb4bcee9a1f055e1f8cbb12cc4e3333a04a3b7770b4b30bd74ea18f1220a71679188d3e925d945449f522664ba75cd6fe4c3771aa8715cd52981d8

    • SSDEEP

      12288:wQ1n6Xu/kw+RL8RaE8qr/y9uBQBIBfFYTSanW6ivuB5oW:L6+4Ed/ycsI8uyIW

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks