General

  • Target

    PO-33120.doc

  • Size

    963KB

  • Sample

    211018-jaqfyadbg8

  • MD5

    71302ed111a77e0a4ea1b7e88443771c

  • SHA1

    035707574afb4e7176b16e23cfc56184c8cf670e

  • SHA256

    b2c3f7a700072b93747169f7d0b90b39d44c1089f64ede59a8db55eab4fdfd69

  • SHA512

    53032ed76c9a9d4198c09f6b98263b0231073898c3fe36416ac64c51c7d048b16bac949ffa43f1eb30f7b2755c54fbe52c8652b78f436eb2726638655bcdf361

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

noha

C2

http://www.mglracing.com/noha/

Decoy

iphone13promax.support

trailer-racks.xyz

overseaspoolservice.com

r2d2u.com

dawajeju.com

nextgenproxyvote.com

xn--vhqp8mm8dbtz.group

commonsenserisk.com

cmcqgxtyd.com

data2form.com

bois-applique.com

originallollipop.com

lj0008lj.net

spfldvaccineday.info

phalcosnusa.com

llcmastermachine.com

onlyforu14.rest

bestmarketingautomations.com

officialswitchmusic.com

thepretenseofjustice.com

Targets

    • Target

      PO-33120.doc

    • Size

      963KB

    • MD5

      71302ed111a77e0a4ea1b7e88443771c

    • SHA1

      035707574afb4e7176b16e23cfc56184c8cf670e

    • SHA256

      b2c3f7a700072b93747169f7d0b90b39d44c1089f64ede59a8db55eab4fdfd69

    • SHA512

      53032ed76c9a9d4198c09f6b98263b0231073898c3fe36416ac64c51c7d048b16bac949ffa43f1eb30f7b2755c54fbe52c8652b78f436eb2726638655bcdf361

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks