General

  • Target

    950bca7263ec42c465df8d851c2f9ca3bd4244acb5240e6d36ef7db55dd91aac

  • Size

    1.6MB

  • Sample

    241121-zjyrnsxmh1

  • MD5

    4ab3fc9e69b8c9e585f6a26704bad4a5

  • SHA1

    4eb3abbaf01b0c9ea550cd62cec749de79631754

  • SHA256

    950bca7263ec42c465df8d851c2f9ca3bd4244acb5240e6d36ef7db55dd91aac

  • SHA512

    1b594beb947053b5d6f8f69b8165de866edac10d41cfb8101c4d3a41bc4dea17b2c94fce4fb8d7f6e22ab62cd2be4166f6a4ed69b9c7d8513c866f8f704721ef

  • SSDEEP

    12288:h3M59aBSHoB/oD5rcAEU8ux1H4qhgm+e09tUfX3z5Tuq1RZANHcTqQh1tpNJApHy:Ato5Y9jV8MN6mzmtUfHtD1QY/EpV4p

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

p086

Decoy

jinshichain.com

worldpettraveler.com

hightecforpc.com

kj97fm.com

streetnewstv.com

webrew.club

wheretogodubai.com

apostapolitica.net

thecafy.com

vinelosangeles.com

gashinc.com

gutitout.net

bvd-invest.com

realtoroutdesk.com

lawnbowlstournaments.net

nobodyisillegal.com

abogadoorihuela.net

sanistela.com

jksecurityworld.com

peppermintproject.com

Targets

    • Target

      OR81530S.exe

    • Size

      636KB

    • MD5

      af331c3c0907af5282c00443536b22c7

    • SHA1

      ed908b4ad857a61bc9aa84bf8d53df894ee7bd5d

    • SHA256

      1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff

    • SHA512

      f00f1eb4df01061dd1bfec6c6df3e509359aa4a5acea5c91f5b9cd41e4bbf218d46a43b25d00922f86d1bbe99d090622e042cea1ce2184bd75d6f47b14fc7423

    • SSDEEP

      12288:jXe9PPlowWX0t6mOQwg1Qd15CcYk0We11Z6SBlWJ1bGo+QTIXZ0+PBBVb:KhloDX0XOf4NARGojTIXu+PzVb

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks