General

  • Target

    payment detail.xlsx

  • Size

    1.3MB

  • Sample

    210722-yfsg2y6dca

  • MD5

    6eb0b98b71b47226880cf66454012b21

  • SHA1

    775fa55b338f7409f5f505e1e453177f02a5014c

  • SHA256

    712a54a86587b69b9520604ddc0f1257298b086cc96b526b5ee9e18a4daddb6d

  • SHA512

    2f099c80afd0aa95fb904f556a34a50996d05c631b6e7f8ed45458d9ae6fa794e7d1e27b3e05130a4402a0ef47988ec1c27f9ca74804c34ca17bf9f5a6167481

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.tjbc-bearing.com/u6bi/

Decoy

5588aiai.com

sint-ecommerce.com

epreyn.com

unexpectedbrewing.com

pomiandpam.com

viverdebatatas.com

dirham.world

accademiadelfuturo.net

mengyaheng.com

ilocalrealtor.com

glomiotel.website

metal1sa.com

kslife.net

maxfitnesslakeoconee.com

hoteldeleauvive.com

sidingzhou.com

getvocall.com

basicryptomining.com

indiasofannapolis.com

tresorbrut.com

Targets

    • Target

      payment detail.xlsx

    • Size

      1.3MB

    • MD5

      6eb0b98b71b47226880cf66454012b21

    • SHA1

      775fa55b338f7409f5f505e1e453177f02a5014c

    • SHA256

      712a54a86587b69b9520604ddc0f1257298b086cc96b526b5ee9e18a4daddb6d

    • SHA512

      2f099c80afd0aa95fb904f556a34a50996d05c631b6e7f8ed45458d9ae6fa794e7d1e27b3e05130a4402a0ef47988ec1c27f9ca74804c34ca17bf9f5a6167481

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks