2024-08-12 (MONDAY): XLOADER/FORMBOOK INFECTION
NOTES:
- Zip files are password-protected. Of note, this site has a new password scheme. For the password, see the "about" page of this website.
ASSOCIATED FILES:
- 2024-08-12-XLoader-Formbook-malspam-0312-UTC.eml.zip 776.4 kB (776,435 bytes)
- 2024-08-12-XLoader-Formbook-infection-traffic.pcap.zip 7.8 MB (7,765,631 bytes)
- 2024-08-12-XLoader-Formbook-malware.zip 1.5 MB (1,459,037 bytes)
HEADER LINE INFORMATION FROM THE EMAIL:
- Received: from inolab
MALWARE
FILES FROM THE INFECTION:
- SHA256 hash: c1bbaa4c8755f137f915709e710c62cc507ce4055cb2fb498d0656f82f66b31a
- File size: 727,946 bytes
- File name: THEMETAL NEW ORDERFOB$ _KORIA PORT.exe
- File type: RAR archive data, v5
- File description: RAR archive seen as the email attachment
- SHA256 hash: 992c1fa1d6584c711280bd3a519018a88c7766728ca0b51024484d9a83ef6d9c
- File size: 779,272 bytes
- File name: THEMETAL NEW ORDERFOB$ _KORIA PORT.exe
- File type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
- File description: 32-bit Windows executable (EXE) for XLoader/Formbook extracted from the above RAR archive
INFECTION TRAFFIC
DOMAINS FROM THE INFECTION TRAFFIC:
- www.354388
IMAGES
Shown above: Screenshot of the email in Thunderbird.
Shown above: Email attachment (RAR archive) and extracted Windows EXE file for XLoader/Formbook.
Shown above: Start of the infection traffic filtered in Wireshark.
Shown above: TCP stream from one of the HTTP POST requests during the post-infection traffic.
Shown above: Traffic later from the infection, after the HTTP POST requests had stopped.
Click here to return to the main page.