General

  • Target

    28ece44257b98a27a4bc5ca9f422e009c9679db1d5ea4fc768a04b8b0cc37d34.exe

  • Size

    547KB

  • Sample

    241123-rf5rtawmdt

  • MD5

    10248fd5a16bb9cebda2d4547c312f87

  • SHA1

    a5d4df6e94552a5b06713aeba7730b10ccee3ed5

  • SHA256

    28ece44257b98a27a4bc5ca9f422e009c9679db1d5ea4fc768a04b8b0cc37d34

  • SHA512

    920cd71f042d6ef2b9a057b42682ec81fe96146deccfe61462b5feb4c5c34b90d8d8e80423fd061a9d330acb701173634d3b2a9c70cd3925ec2e96affd6a6378

  • SSDEEP

    12288:AFU/GqL06WYwJMEHoccFE3n4wt0WBxsxX:AFURQUzEHoceE3Tt9Bxsp

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

a49i

Decoy

myprobioticspayme.com

shavers.today

cinqueportshealthcare.com

itmservicesincne.com

credit-comparison.com

xn--2kr800ab2z.group

onlinebiyoloji.online

risaki.net

americasgotargument.com

rosinterpro.com

cortadoresdejamon.biz

hotamourclub.art

boettcherlaw.com

nuciic.com

redesdelraco.com

chivang.com

yourkstreetexperience.com

yourwaykeji.com

natureate.com

bidyawasterecycling.com

Targets

    • Target

      28ece44257b98a27a4bc5ca9f422e009c9679db1d5ea4fc768a04b8b0cc37d34.exe

    • Size

      547KB

    • MD5

      10248fd5a16bb9cebda2d4547c312f87

    • SHA1

      a5d4df6e94552a5b06713aeba7730b10ccee3ed5

    • SHA256

      28ece44257b98a27a4bc5ca9f422e009c9679db1d5ea4fc768a04b8b0cc37d34

    • SHA512

      920cd71f042d6ef2b9a057b42682ec81fe96146deccfe61462b5feb4c5c34b90d8d8e80423fd061a9d330acb701173634d3b2a9c70cd3925ec2e96affd6a6378

    • SSDEEP

      12288:AFU/GqL06WYwJMEHoccFE3n4wt0WBxsxX:AFURQUzEHoceE3Tt9Bxsp

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks