General

  • Target

    ccf25116808a8f6fdbca6d7dbbc30af45fb382b4b868109dc0f17d5062062aff.xlsx

  • Size

    303KB

  • Sample

    211019-wxyr2sgce6

  • MD5

    3ec955ba8c6df83999cf0454ee958ee4

  • SHA1

    f1df8c8561739662fcf636c262d0af0a74768231

  • SHA256

    afaccad0cadbc5f44a79dd336fbf732d2bae82f41d0e1442919b4e0b18d5ae51

  • SHA512

    25739682f768f1005d88bcee977e6fe2107afcafc0ec7e4b7847de4a612e012b0f4e3e0d5bfc32c137aef52bcebc059e6ddb3f17dfd0b541d11a73ea4e950843

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

wogm

C2

http://www.eygtogel021.com/wogm/

Decoy

sub-dude.net

repeatcustom.com

goodspaz.com

sinagropuree.com

jyh8886.com

muescabynes.quest

stark.agency

nolimit168.com

hypermediastore.com

arab-xt-pro.com

gruppovimar.com

santamariamoto.express

affaridistribuciones.com

straetah.com

collectionsbyvivi.com

nalainteriores.com

weeklywars.com

insightmyhome.com

ucml.net

herderguru.com

Targets

    • Target

      ccf25116808a8f6fdbca6d7dbbc30af45fb382b4b868109dc0f17d5062062aff.xlsx

    • Size

      303KB

    • MD5

      3ec955ba8c6df83999cf0454ee958ee4

    • SHA1

      f1df8c8561739662fcf636c262d0af0a74768231

    • SHA256

      afaccad0cadbc5f44a79dd336fbf732d2bae82f41d0e1442919b4e0b18d5ae51

    • SHA512

      25739682f768f1005d88bcee977e6fe2107afcafc0ec7e4b7847de4a612e012b0f4e3e0d5bfc32c137aef52bcebc059e6ddb3f17dfd0b541d11a73ea4e950843

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks