General

  • Target

    tmp/e77c0dac6db8e58ccd949a237694a0824b4117d521357658a1fc5cb47bbbf893.xls

  • Size

    309KB

  • Sample

    220112-khpp2sbhfk

  • MD5

    4678ecadcced7f0033aebe9eb2900c00

  • SHA1

    2355b35d4edb502550382e41fa96b0e9c565da76

  • SHA256

    e77c0dac6db8e58ccd949a237694a0824b4117d521357658a1fc5cb47bbbf893

  • SHA512

    6c3225f99dcedcd9fbe551d1af4ef89b26c34c96ce39ba61d62131bd2d0cbe9a05473b5d812d04531d53284c57a32611ccdd6b3747b4d566c48e0ef4f1224bc7

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      tmp/e77c0dac6db8e58ccd949a237694a0824b4117d521357658a1fc5cb47bbbf893.xls

    • Size

      309KB

    • MD5

      4678ecadcced7f0033aebe9eb2900c00

    • SHA1

      2355b35d4edb502550382e41fa96b0e9c565da76

    • SHA256

      e77c0dac6db8e58ccd949a237694a0824b4117d521357658a1fc5cb47bbbf893

    • SHA512

      6c3225f99dcedcd9fbe551d1af4ef89b26c34c96ce39ba61d62131bd2d0cbe9a05473b5d812d04531d53284c57a32611ccdd6b3747b4d566c48e0ef4f1224bc7

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks