General

  • Target

    tmp/5f68d743559b59681d1bc2b6bac40f5cc4e3155a2c77f11cbbde4337729fbe02.xls

  • Size

    310KB

  • Sample

    220112-kgbrssbhen

  • MD5

    a3d4cdc8a20ab70adb1e9cb60a4b5a17

  • SHA1

    b216487eafb1f1e8017a1a4992484a720c6852be

  • SHA256

    5f68d743559b59681d1bc2b6bac40f5cc4e3155a2c77f11cbbde4337729fbe02

  • SHA512

    1d6168562018006ca5c29a4af03938b328fe00de3d5c4bf0e1141a90172643d1977cafddaacc8a6a7759747d69d39300c1c790e280c57db3aa966b019c7b3329

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

nt3f

Decoy

tricyclee.com

kxsw999.com

wisteria-pavilion.com

bellaclancy.com

promissioskincare.com

hzy001.xyz

checkouthomehd.com

soladere.com

point4sales.com

socalmafia.com

libertadysarmiento.online

nftthirty.com

digitalgoldcryptostock.net

tulekiloscaird.com

austinfishandchicken.com

wlxxch.com

mgav51.xyz

landbanking.global

saprove.com

babyfaces.skin

Targets

    • Target

      tmp/5f68d743559b59681d1bc2b6bac40f5cc4e3155a2c77f11cbbde4337729fbe02.xls

    • Size

      310KB

    • MD5

      a3d4cdc8a20ab70adb1e9cb60a4b5a17

    • SHA1

      b216487eafb1f1e8017a1a4992484a720c6852be

    • SHA256

      5f68d743559b59681d1bc2b6bac40f5cc4e3155a2c77f11cbbde4337729fbe02

    • SHA512

      1d6168562018006ca5c29a4af03938b328fe00de3d5c4bf0e1141a90172643d1977cafddaacc8a6a7759747d69d39300c1c790e280c57db3aa966b019c7b3329

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks