General

  • Target

    462e83926aa496cb66ce6ad34c0011ce656960e5.xlsm

  • Size

    10KB

  • Sample

    211011-nh3tfshac3

  • MD5

    11021fe891f0ebd39cfa80d8866b40d7

  • SHA1

    462e83926aa496cb66ce6ad34c0011ce656960e5

  • SHA256

    bb1c62d14e3f30eaae6c78838e19adc3ff1ce3e3f54bae25c77b567778a21392

  • SHA512

    153c92921ae4ae1a860ae6009b6d016fad5987d5fbf578cab7f05fb2d5c1d69a8192871727657c249441a6ba6222b40674b4dce23fc6f84da196dc6b395f6337

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://13.92.100.208/au/audio.exe

Extracted

Family

xloader

Version

2.5

Campaign

mexq

C2

http://www.aliexpress-br.com/mexq/

Decoy

cyebang.com

hcswwsz.com

50003008.com

yfly624.xyz

trungtamhohap.xyz

sotlbb.com

bizhan69.com

brandmty.net

fucibou.xyz

orderinformantmailer.store

nobleminers.com

divinevoid.com

quickappraisal.net

adventuretravelsworld.com

ashainitiativemp.com

ikkbs-a02.com

rd26x.com

goraeda.com

abbastanza.info

andypartridge.photography

Targets

    • Target

      462e83926aa496cb66ce6ad34c0011ce656960e5.xlsm

    • Size

      10KB

    • MD5

      11021fe891f0ebd39cfa80d8866b40d7

    • SHA1

      462e83926aa496cb66ce6ad34c0011ce656960e5

    • SHA256

      bb1c62d14e3f30eaae6c78838e19adc3ff1ce3e3f54bae25c77b567778a21392

    • SHA512

      153c92921ae4ae1a860ae6009b6d016fad5987d5fbf578cab7f05fb2d5c1d69a8192871727657c249441a6ba6222b40674b4dce23fc6f84da196dc6b395f6337

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks