General

  • Target

    QUOTATIONN.zip

  • Size

    409KB

  • Sample

    210922-t2tmsafgeq

  • MD5

    fd7fc71642ed6e090f8a72e8c8323905

  • SHA1

    6102cc758bfc24d87a6835f47658772834ea1111

  • SHA256

    fa6dca708d50e731428cca1bb7ba0cfda73d4d48b485988065110fb2cc4ed31c

  • SHA512

    203bcf8afe51583cf18ce96da76d0c9845469b0a3edc1825f229a3a234498b686acc71f7b780afbae2c788ff472a279e4a78500cbf66997e455e3d294e91db94

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

c2ue

C2

http://www.heidevelop.xyz/c2ue/

Decoy

isportdata.com

stellarex.energy

hsucollections.com

menuhaisan.com

joe-tzu.com

lumichargemktg.com

uae.tires

rapidcae.com

softwaresystemsolutions.com

s-galaxy.website

daewon-talks.net

northgamesnetwork.com

catalogue-bouyguestele.com

criativanet.com

theseasonalshift.com

actionfoto.online

openmaildoe.com

trashpenguin.com

ennopure.net

azurermine.com

Targets

    • Target

      QUOTATIONN.exe

    • Size

      822KB

    • MD5

      24960042ad6c12059fc424d9119ebbba

    • SHA1

      a5b44dc60c82a59c6eeeab63b8d38ec9ed2a171e

    • SHA256

      8d536146e57d878eea148bc98170d2f7cad77ea57f0fbefedf3f3c0dcce40ac5

    • SHA512

      0623ed157cad710f3eda179ece6ca41e529b1045d98e773f7252ff1dc8c7f7554a69dc6096353f2b2b5d5872ba2e59c546803169ffcaadbb483220c35fd76d03

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks