General

  • Target

    ORDER-ASLF1SR00116 40HC 21T05 DALIAN TO GENOVA.exe

  • Size

    944KB

  • Sample

    210806-l5dwrn21jx

  • MD5

    5d5276be06b293b3fe9f5acf12cf59f8

  • SHA1

    beb5812c8d6556ea2dfc0d34c43f2fc9ff0cbc60

  • SHA256

    c4d1d6a9baaeb3802cfb9f7e21db83b85236844b62dc05f8ed4822e491703eb3

  • SHA512

    65e1f8faeb145888a059bf4a9d4d0fce144ff07c579414bb59b2c6d2fc6e7c3a796f72fdae6568be4f5368308203a37b14bf1744cb57d3e36ab95bc00d09b10c

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

b8eu

C2

http://www.yummylipz.net/b8eu/

Decoy

ppslide.com

savorysinsation.com

camilaediego2021.com

rstrunk.net

xianshikanxiyang.club

1borefruit.com

ay-danil.club

xamangxcoax.club

waltonunderwood.com

laurabissell.com

laurawmorrow.com

albamauto.net

usamlb.com

theoyays.com

freeitproject.com

jijiservice.com

ukcarpetclean.com

wc399.com

xn--pskrtmebeton-dlbc.online

exclusivemerchantsolutions.com

Targets

    • Target

      ORDER-ASLF1SR00116 40HC 21T05 DALIAN TO GENOVA.exe

    • Size

      944KB

    • MD5

      5d5276be06b293b3fe9f5acf12cf59f8

    • SHA1

      beb5812c8d6556ea2dfc0d34c43f2fc9ff0cbc60

    • SHA256

      c4d1d6a9baaeb3802cfb9f7e21db83b85236844b62dc05f8ed4822e491703eb3

    • SHA512

      65e1f8faeb145888a059bf4a9d4d0fce144ff07c579414bb59b2c6d2fc6e7c3a796f72fdae6568be4f5368308203a37b14bf1744cb57d3e36ab95bc00d09b10c

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks