General

  • Target

    POCWI191502.xlsx

  • Size

    201KB

  • Sample

    211108-j55t4sbee7

  • MD5

    47685fcb4332bcb2447db1b6e1c336d5

  • SHA1

    77f77d5b9389e6e842901a6c693708d75e24708e

  • SHA256

    55077a584aa3b407c6ed89ad60609062ddd6ff66da0c6e66a12a52a2a248be4e

  • SHA512

    1391d3a2abf899313c91420a72c9933f5e4adbf58e6f8ea6c62a9c86338b0469a9db9ae69f186b763c7cbde8ff987557d380e3b613c4a2954ac42d0bea456fa7

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

e4nr

C2

http://www.rizkhr.com/e4nr/

Decoy

mklab.ltd

doabodrum.com

hospitalitysupply.xyz

iamcrypto.pink

studiodesignguru.com

hackersfullmoonartconcepts.com

nutritioustooth.com

cuzanservice.com

het9a.online

datenigthmovies.com

realitytv.xyz

eaglesflair.com

unheavymetal.com

acustomcollective.art

fifthbelle.com

backupplan.xyz

moirechi.online

bot-hack.com

fithefly.com

aonoti.com

Targets

    • Target

      POCWI191502.xlsx

    • Size

      201KB

    • MD5

      47685fcb4332bcb2447db1b6e1c336d5

    • SHA1

      77f77d5b9389e6e842901a6c693708d75e24708e

    • SHA256

      55077a584aa3b407c6ed89ad60609062ddd6ff66da0c6e66a12a52a2a248be4e

    • SHA512

      1391d3a2abf899313c91420a72c9933f5e4adbf58e6f8ea6c62a9c86338b0469a9db9ae69f186b763c7cbde8ff987557d380e3b613c4a2954ac42d0bea456fa7

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

3
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks