General

  • Target

    Swift.xlsx

  • Size

    333KB

  • Sample

    211013-rkkmfaebar

  • MD5

    9a43d5d2ffc56e823280ca84f6bb870f

  • SHA1

    f0945075b44bc2cb2c96b168d47a269eb0d714ce

  • SHA256

    88c07a30074065b292335ae5d4a45f905fa8a6739d3031d2f8236d2d9a27c681

  • SHA512

    b46f3e608f57ae5156336355f0c7bf90ab655f3db16a0318ee0ac6b16e01ee8b5ed4eab78e3662093f9b3d2cae0bbdc9811367b3bb1ccf39098abe731ff2dd67

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ht08

C2

http://www.septemberstockevent200.com/ht08/

Decoy

joye.club

istanbulemlakgalerisi.online

annikadaniel.love

oooci.com

curebase-test.com

swisstradecenter.com

hacticum.com

centercodebase.com

recbi56ni.com

mmj0115.xyz

sharpstead.com

sprklbeauty.com

progettogenesi.cloud

dolinum.com

amaroqadvisors.com

traininig.com

leewaysvcs.com

nashhomesearch.com

joy1263.com

serkanyamac.com

Targets

    • Target

      Swift.xlsx

    • Size

      333KB

    • MD5

      9a43d5d2ffc56e823280ca84f6bb870f

    • SHA1

      f0945075b44bc2cb2c96b168d47a269eb0d714ce

    • SHA256

      88c07a30074065b292335ae5d4a45f905fa8a6739d3031d2f8236d2d9a27c681

    • SHA512

      b46f3e608f57ae5156336355f0c7bf90ab655f3db16a0318ee0ac6b16e01ee8b5ed4eab78e3662093f9b3d2cae0bbdc9811367b3bb1ccf39098abe731ff2dd67

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks