General

  • Target

    new order 18190001.xlsx

  • Size

    1.2MB

  • Sample

    210819-l311t4zpbx

  • MD5

    727cef81cf0948f6d8ed9a1308cf4ff0

  • SHA1

    4f7c6fa08eba471217c7775f55e6d258cddbe2aa

  • SHA256

    7a1e447f7534a388da24abdb7187757d8db1402edc08b3d74bb763cd0a18f86e

  • SHA512

    5882592d9a29d6fba033dd9bbbb58779e31250f007dc742b5a17b150434767395bb397fac765a2f62b935443578243490069bd2b450d353c1191972f55772a72

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ahdu

C2

http://www.casinoregio.com/ahdu/

Decoy

premiumfreebie.com

spintheblackestcircles.com

okaidoku-shop.net

zonaseguradregistropremios.com

wzocflfow.com

maanyah.com

warrioredjuan.com

uniquelypizza.com

wondertreehr.com

ddriiverzautozs.com

mattenterline.com

urenium.com

salonjedibreakthrough.com

imgkurd.com

pierrejacqueslyon.com

quimicasurandina.com

jkpfukgmt.icu

ansariclinic.com

ashleysema.design

arkadiafoliage.com

Targets

    • Target

      new order 18190001.xlsx

    • Size

      1.2MB

    • MD5

      727cef81cf0948f6d8ed9a1308cf4ff0

    • SHA1

      4f7c6fa08eba471217c7775f55e6d258cddbe2aa

    • SHA256

      7a1e447f7534a388da24abdb7187757d8db1402edc08b3d74bb763cd0a18f86e

    • SHA512

      5882592d9a29d6fba033dd9bbbb58779e31250f007dc742b5a17b150434767395bb397fac765a2f62b935443578243490069bd2b450d353c1191972f55772a72

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks