#xloader

2025-11-24

Also at https://cstaipas\.pt/encrypt, though this one is #xloader, a fake c2 at: http://www.emberfmeadowzu\.store/jmy3/

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2025-11-12

#CheckPoint Research demonstrated a new way to use #ChatGPT for #malware analysis directly from the web interface, analyzing #XLoader malware. The workflow using exported IDA data enables static analysis, rapid decryption, IoC extraction, and hidden C2 discovery.

research.checkpoint.com/2025/g

2025-11-05

#malware #opendir #xloader (small one works, big one not so much) at:

https://royfils\.com/encrypt/

2cd9b8fb88e7cbbc5c049441fb61e0aea7be23dc7aa2c109c13abefe7a2ac943

4733feaca04e871d4e0bb052f2437a2f46f10852602ea4f8b2f0170f4838dd87

Daniel Kuhl ✌🏻☮️☕️daniel1820815@infosec.exchange
2025-11-05

🤺 AI vs. XLoader: Guess who’s winning?

#CheckPoint Research used generative AI to tear through #XLoader, one of the most encrypted, evasive malware strains — uncovering its secrets in mere hours.

And here’s the twist: It all happened with #ChatGPT. No heavy tooling. No waiting.

#AI is changing the rules of malware analysis, and the race just shifted in our favor: blog.checkpoint.com/research/c

#CyberSecurity #AIsecurity

2025-08-11 (Monday): Quick post of an #XLoader ( #Formbook ) infection, with a #pcap, email, and #malware sample available at malware-traffic-analysis.net/2

2025-07-30

First time seeing SellOnEtsy UA for #xloader 🙃

2025-06-03

First time I've seen #xloader use @tumblr for traffic noise:

joesandbox.com/analysis/170473

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2025-02-28

2025-02-26 (Wednesday): #XLoader (#Formbook) distributed through #malspam. The email has an attached PDF document. The PDF has links for a ZIP download, and the ZIP contains files that use DLL side-loading for XLoader.

bit.ly/4bgKRU8

Social media post I wrote for my employer on other platforms: 2025-02-26 (Wednesday): #XLoader (#Formbook) distributed through #malspam.

The email has an attached PDF document. The PDF has links for a ZIP download, and the ZIP contains files using DLL side-loading for XLoader.

Details at github.com/PaloAltoNetworks/Un

2025-01-30 (Thursday): #XLoader infection

Unlike my previous XLoader infections, this one didn't run in a VM, so I used a physical host.

A #pcap of the infection traffic, the associated malware samples, and more info is available at malware-traffic-analysis.net/2

Screenshot of my blog post with analysis of the XLoader infection.XLoader distributed as a RAR attachment to an email.  The malware is a Windows executable file within that RAR archive.XLoader persistent on the infected Windows host through a Windows registry update.Traffic from the XLoader infection filtered in Wireshark.
2025-01-14

Hey @da_667 ...you seen this UA with #xloader yet?

<url method="POST" uri="/k2i2/" host="www\.gayhxi\.info" user_agent="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) FoxyWhore Safari/538.1"/>

2024-12-10

An #expiro (believe it or not) dropping #xloader

app.any.run/tasks/43f807db-236

fake c2 and campaign:
http ://www.sunnyz.store/px6j

2024-09-05

@pawel_lukasik These have been #xloader as of late.

2024-08-13

#xloader continues to change...never seen a samsung UA before:

fbe048c713eda8c6d74504c440ecba4507760aed537fbba6171a4566b6452455

2024-07-19

This report has a link to a real example of how Revolver Rabbit uses an RDGA in Xloader. Tracking their domains is tricky and I suspect the full size is much larger than we have caught. if they invest such huge sums into their infrastructure, they must be making bank. #dns #threatintel #threatintelligence #malware #xloader #infoblox #rdga #cybercrime #cybersecurity #infosec #phishing @InfobloxThreatIntel bleepingcomputer.com/news/secu

2024-07-17

We just released a landscape review of Registered DGAs. We review the many ways threat actors are leveraging these algorithms -- including malware, phishing, scams, porns, you name it. Our RDGA detectors find tens of thousands of domains every day, and we've seen the use continue to rise over the last several years. Most folks aren't even aware since actors are doing this in DNS and it often isn't obvious. #dns #threatintel #cybersecurity #cybercrime #infoblox #RDGA #DGA #DDGA #malware #phishing #scams #infoblox #infobloxthreatintel #cybersecurity #threatactor #c2 #revolverrabbit #threatintelligence #cyber #cyberintelligence #xloader #formbook #abusedtld insights.infoblox.com/resource

2024-06-04

Not sure when it happened, but #xloader / #formbook now appears to rotate through campaign ID's:

app.any.run/tasks/4cb7b5ef-5c1

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst