General

  • Target

    Statement of Account.xlsx

  • Size

    343KB

  • Sample

    211018-jaqfyaeagp

  • MD5

    f64b10dbacd98b43a96e5fbb6ad24c3f

  • SHA1

    230148ed7d498f33522666a5c1ba19928da496e4

  • SHA256

    c4d02d2a69ba8a52ee9be8727c37e5cac75a2cbd79aaf51936de99b42fe9d3e2

  • SHA512

    79705ed1eac394c5b47d44641fd14c0bb806bfa3b5ba082ddbfbe89a7679b24da3bfa854c7c8e1b55b1ae8e8a177dcde19b1d394e3dea2b28ff4abed92789f70

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mxnu

C2

http://www.naplesconciergerealty.com/mxnu/

Decoy

insightmyhome.com

gabriellamaxey.com

029atk.xyz

marshconstructions.com

technichoffghosts.com

blue-ivy-boutique-au.com

1sunsetgroup.com

elfkuhnispb.store

caoliudh.club

verifiedpaypal.net

jellyice-tr.com

gatescres.com

bloomberq.online

crystaltopagent.net

uggs-line.com

ecommerceplatform.xyz

historyofcambridge.com

sattaking-gaziabad.xyz

digisor.com

beachpawsmobilegrooming.com

Targets

    • Target

      Statement of Account.xlsx

    • Size

      343KB

    • MD5

      f64b10dbacd98b43a96e5fbb6ad24c3f

    • SHA1

      230148ed7d498f33522666a5c1ba19928da496e4

    • SHA256

      c4d02d2a69ba8a52ee9be8727c37e5cac75a2cbd79aaf51936de99b42fe9d3e2

    • SHA512

      79705ed1eac394c5b47d44641fd14c0bb806bfa3b5ba082ddbfbe89a7679b24da3bfa854c7c8e1b55b1ae8e8a177dcde19b1d394e3dea2b28ff4abed92789f70

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks