General

  • Target

    10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe

  • Size

    1008KB

  • Sample

    241231-yv62raxjes

  • MD5

    79f75d04c7db5ecb07bae08e762a4670

  • SHA1

    fd81c94d3826c99423924c473738b0e549782661

  • SHA256

    10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7a

  • SHA512

    7d71c2371f6a696424d8ab7413492c8431ad4262d82e4a62f4a9a4378815021c2f3d520de162f78182ef1a6022ad7a1cc892f0531b6e2a591f772271ffcc9cac

  • SSDEEP

    24576:ocxWOmBGbzGUm5YejYHcZs+uyBT5MfUW0XRzqSknmw:ocxIGbF8XYHcZEyBT52NgzqFm

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

gr3e

Decoy

laomaody.com

rewilding.land

airtrackdevices.com

absel.zone

aname.xyz

corruptslofnq.xyz

chaikuo.com

kitpanelas10.com

fullnatura.com

lightingway.net

zahidrasool.com

clubfohl.com

edn-by-fges.com

salsacoop.com

youniquegal.com

sedbud.net

theoutsourcedea.com

neema.xyz

aprendacoreldrawdozero.com

nxstpix.space

Targets

    • Target

      10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe

    • Size

      1008KB

    • MD5

      79f75d04c7db5ecb07bae08e762a4670

    • SHA1

      fd81c94d3826c99423924c473738b0e549782661

    • SHA256

      10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7a

    • SHA512

      7d71c2371f6a696424d8ab7413492c8431ad4262d82e4a62f4a9a4378815021c2f3d520de162f78182ef1a6022ad7a1cc892f0531b6e2a591f772271ffcc9cac

    • SSDEEP

      24576:ocxWOmBGbzGUm5YejYHcZs+uyBT5MfUW0XRzqSknmw:ocxIGbF8XYHcZEyBT52NgzqFm

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks