General

  • Target

    Payment Advice.zip

  • Size

    1.0MB

  • Sample

    211206-l2frxsdgcr

  • MD5

    ed6a219cfd57502cb8a1e99f39c52f23

  • SHA1

    fa75ca112a12e13977a21160953562b60a93ed57

  • SHA256

    73010b6f5a8a70c14d61ce68f8d6f7f0d68420e292fcc429122804070ca4da46

  • SHA512

    5f3b1c18b545e0e35410e7001b4c73cd9de416e57237614e63aa0602c9853f7f80fcd751a8e0c76f4b68740681e165ab9a39e02d41f8c535f0bbdf08a767db84

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ea0r

C2

http://www.asiapubz-hk.com/ea0r/

Decoy

lionheartcreativestudios.com

konzertmanagement.com

blackpanther.online

broychim-int.com

takut18.com

txstarsolar.com

herdsherpa.com

igorshestakov.com

shinesbox.com

reflectpkljlt.xyz

oiltoolshub.com

viralmoneychallenge.com

changingalphastrategies.com

mecitiris.com

rdadmin.online

miniambiente.com

kominarcine.com

pino-almond.com

heihit.xyz

junqi888.com

Targets

    • Target

      Payment Advice.exe

    • Size

      1.3MB

    • MD5

      6e976bdd711770b20d6664fd18fe5c7b

    • SHA1

      168d5d7bece8d371a379148c1988841e49b21ace

    • SHA256

      d2b976a493c6d3b694dba0e139cea1d4943c0176a807109a9ab045a6b23b75c1

    • SHA512

      6d6eb05864690352a47dc32670ef968c6c6edd908372e335a8abd44ccd76c6b230177fd29841d0a1672891b7bd1488057358e0d35be80f7c8edea3ef55227648

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks