General

  • Target

    568e16ea50a24983c667821fd80f5ec10d5807ea6dae684a3ebd59bb34602fcb.exe

  • Size

    337KB

  • Sample

    241122-kbwvsatlap

  • MD5

    cd141d3a8fb96fa97c31af53f2846a01

  • SHA1

    44d2224606ee86ac561b305007f955c4c00fb46a

  • SHA256

    568e16ea50a24983c667821fd80f5ec10d5807ea6dae684a3ebd59bb34602fcb

  • SHA512

    9309cc29d373fbf30417c405691831e7f05064e8d6afd73ef42e754b0372884bd70873ab6e779c7554eb4d0caed71218478153a800461b2eb4b337720f4e4763

  • SSDEEP

    6144:WfDetGGYMkhBA1pCyFam6afSPJ3tusE3yTgGqU8VozKCBfc5fTCm+xzqAqw:WfCthzSBWCsamnfSB3tZEEx8VaKCBoj4

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      568e16ea50a24983c667821fd80f5ec10d5807ea6dae684a3ebd59bb34602fcb.exe

    • Size

      337KB

    • MD5

      cd141d3a8fb96fa97c31af53f2846a01

    • SHA1

      44d2224606ee86ac561b305007f955c4c00fb46a

    • SHA256

      568e16ea50a24983c667821fd80f5ec10d5807ea6dae684a3ebd59bb34602fcb

    • SHA512

      9309cc29d373fbf30417c405691831e7f05064e8d6afd73ef42e754b0372884bd70873ab6e779c7554eb4d0caed71218478153a800461b2eb4b337720f4e4763

    • SSDEEP

      6144:WfDetGGYMkhBA1pCyFam6afSPJ3tusE3yTgGqU8VozKCBfc5fTCm+xzqAqw:WfCthzSBWCsamnfSB3tZEEx8VaKCBoj4

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks