General

  • Target

    PO 446593.xlsx

  • Size

    595KB

  • Sample

    210831-begqglsjee

  • MD5

    1014d65c46ff68235ce581fd93f9336d

  • SHA1

    9ee84e43d1820c322de569124e60ee585ba9604c

  • SHA256

    7df06bd9c7d806c3a7b1bddc2b78c6052070b3445cad6d2f9d3f0a21b844075c

  • SHA512

    72b5023e3151018cd8fa1a7081ccc55e23e84809d9c116c45077efe12d0e8aef7cfe0af6ed7280556a99d83e6247c3948e636f13509cc4fd4f3396e8d0403484

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

utrf

C2

http://www.tijprintersolution.com/utrf/

Decoy

serveyournation.com

angelaepedro2021.com

spyrodinero.com

voltaicmassage.com

companystsore.com

eulicense.com

politicianwatchlist.com

gol-investissement.com

novasolutions.website

fouralarmtechnology.com

nightloop.online

saycarrot.com

rdemnry.icu

silverspoonfrenchies.com

safetyswimwear.online

dabanse.com

oldhamvw.com

tvactivations.online

ntra120.com

gallagherandburton.com

Targets

    • Target

      PO 446593.xlsx

    • Size

      595KB

    • MD5

      1014d65c46ff68235ce581fd93f9336d

    • SHA1

      9ee84e43d1820c322de569124e60ee585ba9604c

    • SHA256

      7df06bd9c7d806c3a7b1bddc2b78c6052070b3445cad6d2f9d3f0a21b844075c

    • SHA512

      72b5023e3151018cd8fa1a7081ccc55e23e84809d9c116c45077efe12d0e8aef7cfe0af6ed7280556a99d83e6247c3948e636f13509cc4fd4f3396e8d0403484

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks