General

  • Target

    DocNo2300058329.doc__.rtf

  • Size

    316KB

  • Sample

    210502-6mglz9xjns

  • MD5

    5e37b9c3ab14d8c2349506fa6be2de0d

  • SHA1

    1e5777efbbe88c9f92ec0438eb07d9b7c92ea43d

  • SHA256

    1256f793afb38cb63438acdbb6e1e3646eb66d4ecd1c4fe79178702e43311c94

  • SHA512

    2eb029a1e719a5312084d0ead75af3276a9bab55a112f71df820fd4f681cdfda7eeabdc8ca1cd124e7c5381b5104bf712117fcf1ca6f4dacc6379970241cddca

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.jqjdgw.com/ued5/

Decoy

italiancosmeticbeauty.com

zhima7.com

phresheffect.com

comp-savvy.net

xjhtcaum.com

copperbrassgermkey.com

smero.financial

opticsoptimum.com

pisanosportpraxis.com

pediatricfeedrates.com

binsogleam.com

sarahseatter.com

wywatershed.com

smellyhomeshop.com

naviorchidlife.com

cunerier.com

thecornercomputers.com

brightwoodcollection.com

taxprep-repsolutions.net

phukien4u.net

Targets

    • Target

      DocNo2300058329.doc__.rtf

    • Size

      316KB

    • MD5

      5e37b9c3ab14d8c2349506fa6be2de0d

    • SHA1

      1e5777efbbe88c9f92ec0438eb07d9b7c92ea43d

    • SHA256

      1256f793afb38cb63438acdbb6e1e3646eb66d4ecd1c4fe79178702e43311c94

    • SHA512

      2eb029a1e719a5312084d0ead75af3276a9bab55a112f71df820fd4f681cdfda7eeabdc8ca1cd124e7c5381b5104bf712117fcf1ca6f4dacc6379970241cddca

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks