General

  • Target

    Sajeeb09908976745344567.xlsx

  • Size

    320KB

  • Sample

    211013-rj1l9sech7

  • MD5

    ac493c2681477e3b56acbb570b8e41d9

  • SHA1

    2d9019b6c2f57c6360b155957cb542ae61bbf728

  • SHA256

    9efaa722d6e9df7c6628df6d1f49d14d858b60782db11c3f1e9b5037803b290b

  • SHA512

    a26f5e7baebdf77f54a9e8f1b109b4a9ac2ed74f33fca08f4014b1e185e87d446d2638dd4dff3ec67f229df3ad0bb592549e999851ea75fbd864e3c1df0fe024

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mxnu

C2

http://www.naplesconciergerealty.com/mxnu/

Decoy

insightmyhome.com

gabriellamaxey.com

029atk.xyz

marshconstructions.com

technichoffghosts.com

blue-ivy-boutique-au.com

1sunsetgroup.com

elfkuhnispb.store

caoliudh.club

verifiedpaypal.net

jellyice-tr.com

gatescres.com

bloomberq.online

crystaltopagent.net

uggs-line.com

ecommerceplatform.xyz

historyofcambridge.com

sattaking-gaziabad.xyz

digisor.com

beachpawsmobilegrooming.com

Targets

    • Target

      Sajeeb09908976745344567.xlsx

    • Size

      320KB

    • MD5

      ac493c2681477e3b56acbb570b8e41d9

    • SHA1

      2d9019b6c2f57c6360b155957cb542ae61bbf728

    • SHA256

      9efaa722d6e9df7c6628df6d1f49d14d858b60782db11c3f1e9b5037803b290b

    • SHA512

      a26f5e7baebdf77f54a9e8f1b109b4a9ac2ed74f33fca08f4014b1e185e87d446d2638dd4dff3ec67f229df3ad0bb592549e999851ea75fbd864e3c1df0fe024

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks