General

  • Target

    PO_220101089.exe

  • Size

    368KB

  • Sample

    210831-bmjc6b2gbn

  • MD5

    2f8a0005b48d09e1f28dfa719349335b

  • SHA1

    913c5c240ba257962eb7b5a67fc86a054ee723ae

  • SHA256

    f547d8d44d91b4d09f1323857e573c31a8cb0fb1ed949cc0f8c90f6ea807b23c

  • SHA512

    5bd7c09841e62fa3454590eda06d45518780d150b1e92fff03763ff308fcf6a45fd0bdc4b1b801b927b35fc4f4d3592fccf96c89877363cce24717e0dc758d7f

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

noi6

C2

http://www.offshoresrilanka.com/noi6/

Decoy

yow.today

rkdreamcreations.com

etheriumtech.com

stretchwrench.com

kiddiecruise.com

stickforward.com

videocineproduccion.com

roofinginamerica.com

amarillasnuevomexico.com

armfieldmillerripley.com

macyburn.club

lvbaoshan.com

shopshelponline.com

thebunnybrands.com

newsxplor.com

momunani.com

rebelnqueen.com

tusguitarras.com

nexab2b.com

e3office.express

Targets

    • Target

      PO_220101089.exe

    • Size

      368KB

    • MD5

      2f8a0005b48d09e1f28dfa719349335b

    • SHA1

      913c5c240ba257962eb7b5a67fc86a054ee723ae

    • SHA256

      f547d8d44d91b4d09f1323857e573c31a8cb0fb1ed949cc0f8c90f6ea807b23c

    • SHA512

      5bd7c09841e62fa3454590eda06d45518780d150b1e92fff03763ff308fcf6a45fd0bdc4b1b801b927b35fc4f4d3592fccf96c89877363cce24717e0dc758d7f

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks