General

  • Target

    MV MIGHTY CHAMP.xlsx

  • Size

    129KB

  • Sample

    210923-g2lwqafae6

  • MD5

    c1e9686b42764b8c1910cdb67cf62358

  • SHA1

    8d0ba5dfd7600873f95ccaf735f91df11e45b329

  • SHA256

    4e86a4cecbd721300627352a61c1ee8d87c0c75d88599a10bd59c3e343934f15

  • SHA512

    f11263d5528219f22984aa9dfa8afecb1776c0daf25c2c14c85714adc7302cb2bd0ccdcba0a1a01358d4b889f12645f1666ac5aca0e696291b88c1e053ea63fe

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

arup

C2

http://www.sapphiretype.com/arup/

Decoy

mezonpezon.com

bellapbd.com

xn--2kr800ab2z.group

cupecoysuites.com

extractselect.com

cherrycooky.com

reshawna.com

bluewinetours.com

dez2fly.com

washedproductions.com

om-asahi-kasei-jp.com

talkingpoint.tours

avaspacecompany.com

fbtvmall.com

trocaoferta.com

mionegozio.com

reitschuetz.com

basepicks.com

networkagricity.com

kastore.club

Targets

    • Target

      MV MIGHTY CHAMP.xlsx

    • Size

      129KB

    • MD5

      c1e9686b42764b8c1910cdb67cf62358

    • SHA1

      8d0ba5dfd7600873f95ccaf735f91df11e45b329

    • SHA256

      4e86a4cecbd721300627352a61c1ee8d87c0c75d88599a10bd59c3e343934f15

    • SHA512

      f11263d5528219f22984aa9dfa8afecb1776c0daf25c2c14c85714adc7302cb2bd0ccdcba0a1a01358d4b889f12645f1666ac5aca0e696291b88c1e053ea63fe

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks