Resubmissions

11-03-2022 13:36

220311-qwqgdshfa3 4

25-11-2021 16:57

211125-vf983sfhck 10

General

  • Target

    Documents – Packing List Commercial Invoice

  • Size

    18KB

  • Sample

    211125-vf983sfhck

  • MD5

    a5b0056fd2f56303ba063e967644b85f

  • SHA1

    33be2e3727a6e239185edc9deb0134a1a8e3bea1

  • SHA256

    c9d934e0fcb1ab001bc65247caad607d2510f451fc507a7e0773472c70bd15c6

  • SHA512

    dba809471f0bd68da03367c86d30656f85df5624d4d5270d7971b4ce55f3093cfd8551d44ac948600fef8ec9c91a87672989fd8d3b0762cae62a38370e8f463d

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

rh6s

C2

http://www.barkerfamilyenterprises.com/rh6s/

Decoy

plantzs.com

oasisphere.net

oprimaelnumerodos.com

youcansquarespace.com

smartaj7.xyz

pawes.top

dailytoyotatuson.com

moksel.com

flytt-gubbarna.com

xn--tecladoscon-ceb.com

boilingly.top

liabilitylimitresearch.com

dumkahaunt.com

butibori.com

guiadeafiliados.com

ponderingprofits.com

industrionaire.com

forum-solana.support

jinsei-tabi.com

everyonesconcretesolutions.com

Targets

    • Target

      Documents – Packing List Commercial Invoice

    • Size

      18KB

    • MD5

      a5b0056fd2f56303ba063e967644b85f

    • SHA1

      33be2e3727a6e239185edc9deb0134a1a8e3bea1

    • SHA256

      c9d934e0fcb1ab001bc65247caad607d2510f451fc507a7e0773472c70bd15c6

    • SHA512

      dba809471f0bd68da03367c86d30656f85df5624d4d5270d7971b4ce55f3093cfd8551d44ac948600fef8ec9c91a87672989fd8d3b0762cae62a38370e8f463d

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks