General

  • Target

    7c207438745687fd62777e3b18535020

  • Size

    1.0MB

  • Sample

    210823-s1fpqkphv6

  • MD5

    7c207438745687fd62777e3b18535020

  • SHA1

    58f4bd7b9ff178ccb194befee4c3105b8cbac1fc

  • SHA256

    d1a1c263b4343b91e2d8dc0ac2bda68cb43490b98cd59afa6dcc7128dcbb4d0b

  • SHA512

    d5e529d6702ad005d537a91e29ec0d784ce21869caebc946a3a3fb380eba4e1d9df59f8dd0fa25ef652cef1a01c5267785bc5e8847c8dace9e61c78ecb890e35

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

b8eu

C2

http://www.yummylipz.net/b8eu/

Decoy

ppslide.com

savorysinsation.com

camilaediego2021.com

rstrunk.net

xianshikanxiyang.club

1borefruit.com

ay-danil.club

xamangxcoax.club

waltonunderwood.com

laurabissell.com

laurawmorrow.com

albamauto.net

usamlb.com

theoyays.com

freeitproject.com

jijiservice.com

ukcarpetclean.com

wc399.com

xn--pskrtmebeton-dlbc.online

exclusivemerchantsolutions.com

Targets

    • Target

      7c207438745687fd62777e3b18535020

    • Size

      1.0MB

    • MD5

      7c207438745687fd62777e3b18535020

    • SHA1

      58f4bd7b9ff178ccb194befee4c3105b8cbac1fc

    • SHA256

      d1a1c263b4343b91e2d8dc0ac2bda68cb43490b98cd59afa6dcc7128dcbb4d0b

    • SHA512

      d5e529d6702ad005d537a91e29ec0d784ce21869caebc946a3a3fb380eba4e1d9df59f8dd0fa25ef652cef1a01c5267785bc5e8847c8dace9e61c78ecb890e35

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks