General

  • Target

    Hua Joo Success Industry.xlsx

  • Size

    590KB

  • Sample

    210920-hzlnlsfhdm

  • MD5

    74fa450d0d5c2635b91a63fec6a6014e

  • SHA1

    b9c4dde16c1882145f0cdf26400365f878c8608b

  • SHA256

    c4cf66d4270ed0cd9203da8136221f9615b65b2e99154c349ca70edbb0b73218

  • SHA512

    81779b4cb9a9d9b2deb7ca911092ce2361db9d599546ff2ffbe665f68e08c0b4347ff4265eeaba1a730fe78abe4e429dbb29734b97cc6c08560e96c10ca8130b

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

euzn

C2

http://www.heser.net/euzn/

Decoy

235296tyc.com

gold12guide.art

baibuaherb.com

weberwines.tax

chezvitoria.com

aidenb.tech

pitchdeckservice.com

surgeryforfdf.xyz

workunvaccinated.com

hrtaro.com

yourotcs.com

sonimultispecialityclinic.com

consultantadvisors.com

pentesting-consulting.com

dantechs.digital

longshifa.online

taweilai.net

imyusuke.com

cashndashfinancial.com

fasiglimt.quest

Targets

    • Target

      Hua Joo Success Industry.xlsx

    • Size

      590KB

    • MD5

      74fa450d0d5c2635b91a63fec6a6014e

    • SHA1

      b9c4dde16c1882145f0cdf26400365f878c8608b

    • SHA256

      c4cf66d4270ed0cd9203da8136221f9615b65b2e99154c349ca70edbb0b73218

    • SHA512

      81779b4cb9a9d9b2deb7ca911092ce2361db9d599546ff2ffbe665f68e08c0b4347ff4265eeaba1a730fe78abe4e429dbb29734b97cc6c08560e96c10ca8130b

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks