General

  • Target

    e92a2df7e1f55fc46bacf90daa9bb34bc433c4dd6977aa3ac48e37c4fa46818a.exe

  • Size

    493KB

  • Sample

    241122-jtm5xswrht

  • MD5

    e0f810d0ef3b5cb9b17cac7840f335d9

  • SHA1

    f55d63d6ee6258cbcc7daff7b0d6db70cf3fb449

  • SHA256

    e92a2df7e1f55fc46bacf90daa9bb34bc433c4dd6977aa3ac48e37c4fa46818a

  • SHA512

    2d2ef4d5dd6c39d0c576fa777db516da7df5ca08478e445872b458745f4d31b5ea30e7956037e6080e2994e21cf28ef798afc2d4982c7fbc593a61f8ef8d39f8

  • SSDEEP

    12288:yo02vVCPnF5+SdVr5PJPawONO/N7coUt8:yo02vGPXmwyOmoUC

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

yjqn

Decoy

ittybittybunnies.com

flordedesierto.com

cum.care

petshomespace.com

verputzarbeit.com

yuvajanmat.com

getlie.com

finanes.xyz

thelazyrando.com

domelite.design

yukinko-takasu.com

pontosmensal.com

maurlinoconstruction.com

getelectronow.com

newmexicocarwrecklawfirm.com

gunnbucks.com

ncsy30.xyz

opsem.info

authorisewallet.com

scchanghe.com

Targets

    • Target

      e92a2df7e1f55fc46bacf90daa9bb34bc433c4dd6977aa3ac48e37c4fa46818a.exe

    • Size

      493KB

    • MD5

      e0f810d0ef3b5cb9b17cac7840f335d9

    • SHA1

      f55d63d6ee6258cbcc7daff7b0d6db70cf3fb449

    • SHA256

      e92a2df7e1f55fc46bacf90daa9bb34bc433c4dd6977aa3ac48e37c4fa46818a

    • SHA512

      2d2ef4d5dd6c39d0c576fa777db516da7df5ca08478e445872b458745f4d31b5ea30e7956037e6080e2994e21cf28ef798afc2d4982c7fbc593a61f8ef8d39f8

    • SSDEEP

      12288:yo02vVCPnF5+SdVr5PJPawONO/N7coUt8:yo02vGPXmwyOmoUC

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks