Resubmissions

16-08-2021 08:13

210816-g9g5qdtss6 10

16-08-2021 02:37

210816-916qkap392 10

27-07-2021 16:09

210727-16hdt92t9x 10

General

  • Target

    e8af1892a757aa0f0693ce9677e69328

  • Size

    699KB

  • Sample

    210727-16hdt92t9x

  • MD5

    e8af1892a757aa0f0693ce9677e69328

  • SHA1

    f79c8d60ac27830351d257f2dbe00a72ea7b889c

  • SHA256

    1ea32ffb0d84a4c157e12e6a3bd153a3cf3bb878ec2ef474fb547ee6fc7e9cc4

  • SHA512

    f6f8bf083a5f04c450aa574b803d20eefe5dd1dc423b6ad502a7b7926967f0bd5e79424ce3876018bfb8ef04e0eb801ce6415c3156cccd9c15a5a678bd305ae1

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.yummylipz.net/b8eu/

Decoy

ppslide.com

savorysinsation.com

camilaediego2021.com

rstrunk.net

xianshikanxiyang.club

1borefruit.com

ay-danil.club

xamangxcoax.club

waltonunderwood.com

laurabissell.com

laurawmorrow.com

albamauto.net

usamlb.com

theoyays.com

freeitproject.com

jijiservice.com

ukcarpetclean.com

wc399.com

xn--pskrtmebeton-dlbc.online

exclusivemerchantsolutions.com

Targets

    • Target

      e8af1892a757aa0f0693ce9677e69328

    • Size

      699KB

    • MD5

      e8af1892a757aa0f0693ce9677e69328

    • SHA1

      f79c8d60ac27830351d257f2dbe00a72ea7b889c

    • SHA256

      1ea32ffb0d84a4c157e12e6a3bd153a3cf3bb878ec2ef474fb547ee6fc7e9cc4

    • SHA512

      f6f8bf083a5f04c450aa574b803d20eefe5dd1dc423b6ad502a7b7926967f0bd5e79424ce3876018bfb8ef04e0eb801ce6415c3156cccd9c15a5a678bd305ae1

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks