General

  • Target

    TransportLabel_1189160070.xlsx

  • Size

    334KB

  • Sample

    211014-j76jesgff8

  • MD5

    b21b088d12787311f331eac08a45cfa0

  • SHA1

    0b4c9590dab94b7c84d788d27d8f4522395b961f

  • SHA256

    f8e5931926034fb027649ebd98867c41315b44bd05c7bb56f5f506a170162010

  • SHA512

    d7ecd91eb97b7a79b2346503d580fb747eff2867b7570ecac91d862bebe2922ac27d2e3c5bbb09474967164a992fa7a4a344dbf7d418e6408c7fb2813a692e20

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mxnu

C2

http://www.naplesconciergerealty.com/mxnu/

Decoy

insightmyhome.com

gabriellamaxey.com

029atk.xyz

marshconstructions.com

technichoffghosts.com

blue-ivy-boutique-au.com

1sunsetgroup.com

elfkuhnispb.store

caoliudh.club

verifiedpaypal.net

jellyice-tr.com

gatescres.com

bloomberq.online

crystaltopagent.net

uggs-line.com

ecommerceplatform.xyz

historyofcambridge.com

sattaking-gaziabad.xyz

digisor.com

beachpawsmobilegrooming.com

Targets

    • Target

      TransportLabel_1189160070.xlsx

    • Size

      334KB

    • MD5

      b21b088d12787311f331eac08a45cfa0

    • SHA1

      0b4c9590dab94b7c84d788d27d8f4522395b961f

    • SHA256

      f8e5931926034fb027649ebd98867c41315b44bd05c7bb56f5f506a170162010

    • SHA512

      d7ecd91eb97b7a79b2346503d580fb747eff2867b7570ecac91d862bebe2922ac27d2e3c5bbb09474967164a992fa7a4a344dbf7d418e6408c7fb2813a692e20

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks