General

  • Target

    new_order.xlsx

  • Size

    369KB

  • Sample

    211021-kbabsaaad6

  • MD5

    769b73e8a1a135fe942ad288a81e759d

  • SHA1

    7e4431f8b1254ff52b712a708784787ccd154c9f

  • SHA256

    bdb3bffbe1e9d781bea723b985ca461f7a5871c5aaf7cf5aa1d78434719d8f82

  • SHA512

    318b3b85eb1214389796d7051dac207e90d26e3ec9940c5a5618fbfa16d0ad4eb01fdfa99e116a1bdf84c6a5bceb95a53665b796eabfccd45a6b99fb42c173c3

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

rqan

C2

http://www.cardboutiqueapp.com/rqan/

Decoy

panda.wiki

gailkannamassage.com

ungravitystudio.com

coraggiomusicschool.com

51walkerstreetrippleside.com

infemax.store

mapara-foundation.net

elitespeedwaxs.com

manateeprint.com

thelocksmithtradeshow.com

phoenix-out-of-ashes.com

marionkgregory.store

abasketofwords.com

century21nokta.com

anthonyaarnold.com

forevermyanmar.com

ramashi.com

uniquecarbonbrush.com

packecco.com

appelnacrtl.quest

Targets

    • Target

      new_order.xlsx

    • Size

      369KB

    • MD5

      769b73e8a1a135fe942ad288a81e759d

    • SHA1

      7e4431f8b1254ff52b712a708784787ccd154c9f

    • SHA256

      bdb3bffbe1e9d781bea723b985ca461f7a5871c5aaf7cf5aa1d78434719d8f82

    • SHA512

      318b3b85eb1214389796d7051dac207e90d26e3ec9940c5a5618fbfa16d0ad4eb01fdfa99e116a1bdf84c6a5bceb95a53665b796eabfccd45a6b99fb42c173c3

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks