General

  • Target

    001_Shipping_Documents_information_092121.xlsx

  • Size

    588KB

  • Sample

    210921-jwjkhsbdgj

  • MD5

    21ebbd592e50341c7dfdde85bd801fbc

  • SHA1

    b4421c31784ecfc4b523f77fa0ff804fd8920dcd

  • SHA256

    917256cc05e973907b1b96166374b2a31b2cba9c328c1a79a8bc1e50f2979bcd

  • SHA512

    5abaa9d5049c9852724132b488ea8ba38f8333c30bb7ad7ecf4cc9bd4d6ab48a47b322c1d24ee197a9408d2a98e0bf458d3886a23214cb0fde156ffb63c9be2a

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

m0np

C2

http://www.devmedicalcentre.com/m0np/

Decoy

gruppovimar.com

seniordatingtv.com

pinpinyouqian.website

retreatreflectreplenish.com

baby-handmade.store

econsupplies.com

helloaustinpodcast.com

europe-lodging.com

ferahanaokulu.com

thehomeinspo.com

rawhoneytnpasumo6.xyz

tyckasei.quest

scissorsandbuffer.com

jatinvestmentsmaldives.com

softandcute.store

afuturemakerspromotions.online

leonsigntech.com

havetheshortscovered.com

cvkf.email

iplyyu.com

Targets

    • Target

      001_Shipping_Documents_information_092121.xlsx

    • Size

      588KB

    • MD5

      21ebbd592e50341c7dfdde85bd801fbc

    • SHA1

      b4421c31784ecfc4b523f77fa0ff804fd8920dcd

    • SHA256

      917256cc05e973907b1b96166374b2a31b2cba9c328c1a79a8bc1e50f2979bcd

    • SHA512

      5abaa9d5049c9852724132b488ea8ba38f8333c30bb7ad7ecf4cc9bd4d6ab48a47b322c1d24ee197a9408d2a98e0bf458d3886a23214cb0fde156ffb63c9be2a

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

      suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks