General

  • Target

    3b67f83ca51ccbae0cf01f8d10083eade40c3e0c8ca70bab4d4bd958423b96b8

  • Size

    296KB

  • Sample

    241122-jjee2aspbj

  • MD5

    968b8e04bab4d56839c6cf970dbd78b2

  • SHA1

    e717dbad2eb2db279bdf2ed34cdafa2e4eb265c9

  • SHA256

    3b67f83ca51ccbae0cf01f8d10083eade40c3e0c8ca70bab4d4bd958423b96b8

  • SHA512

    e80998a4d9b12e555ee1c036a4f791a6532630d2959f5a297fff9cb6e3bd5e90605f768b958f3d8a355656de4243ab3fd2b4e16ff0566f4c6753eb58e412f330

  • SSDEEP

    6144:CoJ5pzEujY9AGdISypnOLacFVEmBK66C6Yn:CoJ5pzkdISypg92mBKRc

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

seqa

Decoy

alstartnpasumo5.xyz

jarvisbranding.com

kyiv-bdsm.club

hunttools.info

bantaleautomotiveengineers.com

comercioexpresschilpancingo.com

smallbusinessalliancegroup.com

swlawfirmok.com

marketciphermerch.com

gxmmvcn.icu

betwonsikayet.com

bise.tech

minismi2.com

bucklestylez.com

hereford-cattle.com

yufude.com

tangerineinit.com

destinyforfreedom.com

team-rwby-project.com

richardkmartinez.store

Targets

    • Target

      8df2d74b5e18e72df64a8c00c3029ab3dc4cdd34cc30911be682316f9028c280

    • Size

      338KB

    • MD5

      bb84bb36af9481380cf2074b311b51c6

    • SHA1

      bd7789ada08fd16894bcf0d269991c7aa5e79c10

    • SHA256

      8df2d74b5e18e72df64a8c00c3029ab3dc4cdd34cc30911be682316f9028c280

    • SHA512

      828b2287699abf1768623be0ea68c2f38e74fa5b94a125bfd78aaf345c87e14460828be6f51899fd091da0105d37d99fc134a55c5825d16f2b761ca86e9daae8

    • SSDEEP

      6144:QGi9fvS1tIr8IiWYCBFk8giJxzC/eyu8o+87eUb5/1l4b3Oj:oqtIr5vRgibz/ycfb5Ub3g

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/spgmjdph.dll

    • Size

      93KB

    • MD5

      0fbc559ab75e9cd8326de1b0aa075a8f

    • SHA1

      ea1c07acf1913c487c18060380a71bfe18b72791

    • SHA256

      bdf272998ebda2e91775e6a463ff01cfcf1cdbdbec3309bb61caaf1b5d28eec4

    • SHA512

      72b83b58dc1ec3051557431b50b146784f43fcdb0d5c9f6bef7c9876d8455908f3c486be561567e71b2036fb13ad6739f713d4205b079a6c379b4306154ed1f6

    • SSDEEP

      1536:j5ERZT7DoOkA0L0zM5oDB6HKbWyhe2FBbUfs9Cg5+l1OB:j5ERZTPoOkA0avBge55+l

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks