General

  • Target

    product specification.xlsx

  • Size

    1.4MB

  • Sample

    210503-yl97jaeyxn

  • MD5

    75c48b4392ae795beeb0317bfaef77bd

  • SHA1

    8e3e8daaa18cb3cf0e3b73e90ecbd297c9d5e1ee

  • SHA256

    4a5c10a7e9ec7b65f8605186726d4861c5bc96870204e12eb260ebd841e7aedb

  • SHA512

    95480a723ab8360552a5d6820cd0ffd1371da2bc49d008620b1b7d034d49c2a6d69e2fd7b62af414f9260ee00f0c48bb8e045c1ca9f9d0de843a3e9b0b759366

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.montcoimmigrationlawyer.com/uoe8/

Decoy

chalance.design

certifiedlaywernj.com

bsbgraphic.com

caeka.com

zagorafinancial.com

cvingenieriacivil.net

mojilifenoosa.com

bucktheherd.net

sparkmonic.com

catherineandwilson.com

cdefenders.com

intersp.net

santoriniimpressivetours.net

arkansaspaymentrelief.com

tewab.com

bjzjgjg.com

michgoliki.com

oallahplease.com

plaisterpress.com

redyroblx.com

Targets

    • Target

      product specification.xlsx

    • Size

      1.4MB

    • MD5

      75c48b4392ae795beeb0317bfaef77bd

    • SHA1

      8e3e8daaa18cb3cf0e3b73e90ecbd297c9d5e1ee

    • SHA256

      4a5c10a7e9ec7b65f8605186726d4861c5bc96870204e12eb260ebd841e7aedb

    • SHA512

      95480a723ab8360552a5d6820cd0ffd1371da2bc49d008620b1b7d034d49c2a6d69e2fd7b62af414f9260ee00f0c48bb8e045c1ca9f9d0de843a3e9b0b759366

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks