General

  • Target

    REMITTANCE ADVICE.xlsx

  • Size

    228KB

  • Sample

    211125-vgv6jsfhdl

  • MD5

    2caab2292b282e6a5dea1cf78f84924a

  • SHA1

    86f37c31091b15cca135490a84eb52027bb1a4df

  • SHA256

    4c84124c87cd46ce58a7a8208ad1674c4a270793f9a6158e80fd28f96b3cc844

  • SHA512

    70590f55c98c31fb7b2a95cb6d6b63917e1fa0f868c3af852a805d45cbb176356a4b1dc1431ef908c680821730d0d02948956c03388fcee6fcf6bbd661d55733

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

m07f

C2

http://www.ff4cu6twc.xyz/m07f/

Decoy

khitthit.club

kczu.net

caylalamar.com

iixiazai.com

nickatwoodrealestate.com

006664.com

strimsbdltd.com

mykyhouse.com

flyestkicks.com

campingwithoutcanvas.com

sarishamisen.com

retrorecycling.com

zw4azsjb3cuj.biz

lokasennaservices.com

charleswagner.xyz

smmbazar.net

rebornmkt.com

clicktoreach.com

alendigital.xyz

carehrc.com

Targets

    • Target

      REMITTANCE ADVICE.xlsx

    • Size

      228KB

    • MD5

      2caab2292b282e6a5dea1cf78f84924a

    • SHA1

      86f37c31091b15cca135490a84eb52027bb1a4df

    • SHA256

      4c84124c87cd46ce58a7a8208ad1674c4a270793f9a6158e80fd28f96b3cc844

    • SHA512

      70590f55c98c31fb7b2a95cb6d6b63917e1fa0f868c3af852a805d45cbb176356a4b1dc1431ef908c680821730d0d02948956c03388fcee6fcf6bbd661d55733

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks