General

  • Target

    vbc.exe

  • Size

    830KB

  • Sample

    210504-1qvnq6le2n

  • MD5

    020adea3f32c15a0dc4a23522798c3f2

  • SHA1

    88378c179cc71548d98eb0500829019be8f22dcb

  • SHA256

    e3404e10a2f6b9abb35ab5869a8c78167c82b72815bc59983cd018170412d53d

  • SHA512

    1a903bfebf8c75dd08e5907f3fcacfc44635df1a1563b2cbab704ee6d5370b350600c1d23921aac0d20b69a2033d4aad6131ec7e5971b46d7445dc93536370d8

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.apluspro.online/bgnq/

Decoy

customsclearingagents.com

vsemasteraokon.online

seeheresthething.com

chozamtravel.com

cjkustom.com

djeffexla.com

survivingks.com

rokascapitalmanagement.net

tekdesignlimited.com

1499parkave.com

fontanerosboadilla.com

jesusencounterminisries.com

uouhodler.com

cordstraw.com

dab50074.com

sarahleinartstore.com

inawinnebago.com

wassersportzentrum.online

giselabustamante.com

gulaturun.com

Targets

    • Target

      vbc.exe

    • Size

      830KB

    • MD5

      020adea3f32c15a0dc4a23522798c3f2

    • SHA1

      88378c179cc71548d98eb0500829019be8f22dcb

    • SHA256

      e3404e10a2f6b9abb35ab5869a8c78167c82b72815bc59983cd018170412d53d

    • SHA512

      1a903bfebf8c75dd08e5907f3fcacfc44635df1a1563b2cbab704ee6d5370b350600c1d23921aac0d20b69a2033d4aad6131ec7e5971b46d7445dc93536370d8

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Tasks