General

  • Target

    P.O-5433ERE.doc

  • Size

    21KB

  • Sample

    211125-vf983sbbh2

  • MD5

    17ca06000e92058f0d43259b2683537c

  • SHA1

    db453e5125310d209fe04fb0211677d79d25f3ee

  • SHA256

    3c9280552a4129fdf884414b080c80d5ffc72403079d7a5292e9b09d832ab37d

  • SHA512

    3e05cc9f7284eb7a1d6756380882b0b1b2d89ce42b887e6c28c49342a9ce61157392997f7bdd96add1fbeefe3ea2ce07c14e8b1e6b245488a2c248d0b8e51148

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

op9t

C2

http://www.fcusd4.com/op9t/

Decoy

tzjwt261888.com

top10iecasinos.com

nurotag.com

controlparental24.com

truenettnpasumo1.xyz

finsits.com

publicfigure.skin

natalispharma.com

brixbol.com

bal.group

perfectinteractivemedia.com

fascialboost.com

jgcpfb120.com

grizzlysolutionsllc.net

wearegardenersusa.com

rjsarka.com

shintoku-gsfarm.com

1oavyx.com

volunteervabetweenk.com

tdshawn.com

Targets

    • Target

      P.O-5433ERE.doc

    • Size

      21KB

    • MD5

      17ca06000e92058f0d43259b2683537c

    • SHA1

      db453e5125310d209fe04fb0211677d79d25f3ee

    • SHA256

      3c9280552a4129fdf884414b080c80d5ffc72403079d7a5292e9b09d832ab37d

    • SHA512

      3e05cc9f7284eb7a1d6756380882b0b1b2d89ce42b887e6c28c49342a9ce61157392997f7bdd96add1fbeefe3ea2ce07c14e8b1e6b245488a2c248d0b8e51148

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks