General

  • Target

    f085f3f2bd1fe6da4eaeafdfc35a1a0e31d861dcabd6e686d224d50dabff8b8e.exe

  • Size

    438KB

  • Sample

    241122-hqya2swlbw

  • MD5

    cb11ccb42aab6300427ddec224524e14

  • SHA1

    436d8c5761238a5e82f5332b192318b80e971300

  • SHA256

    f085f3f2bd1fe6da4eaeafdfc35a1a0e31d861dcabd6e686d224d50dabff8b8e

  • SHA512

    6cb35dd8eef7b85c0105b8f3ba7fe7d774c520384658c753685ea0fbafe6396a0030a3b8f4dcaec6e33e66927f6138af850a887a2809008ffd78c625b308bfaa

  • SSDEEP

    12288:SdeLnIVvjGGAFviNzSkyDK1gqVW9qMX4sH:PsVgOzQ+W9qK4sH

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

riho

Decoy

surfcitydawg.com

pwuq9t.com

prefectfxtrader.com

369xy.com

bjhygj888.com

cabinetfuid.com

houstondynamics.net

bertiebots.com

taboohospitality.com

fearlessthread.com

loropiana-store.online

growthventuresinc.net

artairazur.xyz

tvframesdisply.com

flammifer.biz

gtnetpro.com

b3sportaintment.com

housing-staff.net

superdelicioso.com

14mpt.xyz

Targets

    • Target

      f085f3f2bd1fe6da4eaeafdfc35a1a0e31d861dcabd6e686d224d50dabff8b8e.exe

    • Size

      438KB

    • MD5

      cb11ccb42aab6300427ddec224524e14

    • SHA1

      436d8c5761238a5e82f5332b192318b80e971300

    • SHA256

      f085f3f2bd1fe6da4eaeafdfc35a1a0e31d861dcabd6e686d224d50dabff8b8e

    • SHA512

      6cb35dd8eef7b85c0105b8f3ba7fe7d774c520384658c753685ea0fbafe6396a0030a3b8f4dcaec6e33e66927f6138af850a887a2809008ffd78c625b308bfaa

    • SSDEEP

      12288:SdeLnIVvjGGAFviNzSkyDK1gqVW9qMX4sH:PsVgOzQ+W9qK4sH

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks