General

  • Target

    MV MANDARIN SKY.xlsx

  • Size

    369KB

  • Sample

    211021-gzyshahhf5

  • MD5

    c5ec05f0cccf093f4cf3234b09afbe8f

  • SHA1

    2637d22813c3682f4c952078889351900aad218b

  • SHA256

    9450a8d999143739c233bbfb12bca8975bb92255aef22486369704ad774b9737

  • SHA512

    ec902def9b1e62eba9af009a76402b9860c0d4183ff34772b4907fb22dfc8b396664369f407a31e1b0563b8afc1294279a31174f4fb3af55e305154a4f12ae7c

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

wogm

C2

http://www.eygtogel021.com/wogm/

Decoy

sub-dude.net

repeatcustom.com

goodspaz.com

sinagropuree.com

jyh8886.com

muescabynes.quest

stark.agency

nolimit168.com

hypermediastore.com

arab-xt-pro.com

gruppovimar.com

santamariamoto.express

affaridistribuciones.com

straetah.com

collectionsbyvivi.com

nalainteriores.com

weeklywars.com

insightmyhome.com

ucml.net

herderguru.com

Targets

    • Target

      MV MANDARIN SKY.xlsx

    • Size

      369KB

    • MD5

      c5ec05f0cccf093f4cf3234b09afbe8f

    • SHA1

      2637d22813c3682f4c952078889351900aad218b

    • SHA256

      9450a8d999143739c233bbfb12bca8975bb92255aef22486369704ad774b9737

    • SHA512

      ec902def9b1e62eba9af009a76402b9860c0d4183ff34772b4907fb22dfc8b396664369f407a31e1b0563b8afc1294279a31174f4fb3af55e305154a4f12ae7c

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks