General

  • Target

    vbc.exe

  • Size

    522KB

  • Sample

    211012-mt26macbdl

  • MD5

    2a65c38ce6f23978eafff6a3c8399eae

  • SHA1

    35210a6bfdecd5349dd0669fe4a8fc5127accdc8

  • SHA256

    d4d741eed6175c2c27cad4ef53d1413c9722b37411e82f30334a611bcbe856b2

  • SHA512

    53d65776cf10b7e7ef7297c3b36cec7bded315db546c7e81510b49b8a0c399772cb900682a95b58465255a5d1592717212ab3e5a3dd610b64796cccacc816b48

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

b2c0

C2

http://www.thesewhitevvalls.com/b2c0/

Decoy

bjyxszd520.xyz

hsvfingerprinting.com

elliotpioneer.com

bf396.com

chinaopedia.com

6233v.com

shopeuphoricapparel.com

loccssol.store

truefictionpictures.com

playstarexch.com

peruviancoffee.store

shobhajoshi.com

philme.net

avito-rules.com

independencehomecenters.com

atp-cayenne.com

invetorsbank.com

sasanos.com

scentfreebnb.com

catfuid.com

Targets

    • Target

      vbc.exe

    • Size

      522KB

    • MD5

      2a65c38ce6f23978eafff6a3c8399eae

    • SHA1

      35210a6bfdecd5349dd0669fe4a8fc5127accdc8

    • SHA256

      d4d741eed6175c2c27cad4ef53d1413c9722b37411e82f30334a611bcbe856b2

    • SHA512

      53d65776cf10b7e7ef7297c3b36cec7bded315db546c7e81510b49b8a0c399772cb900682a95b58465255a5d1592717212ab3e5a3dd610b64796cccacc816b48

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Deletes itself

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

System Information Discovery

1
T1082

Tasks