General

  • Target

    RFQ SHEET .xlsx

  • Size

    310KB

  • Sample

    220112-kv2kdacadn

  • MD5

    f1f0cc08d95ede93773d5c81ca809905

  • SHA1

    418aadf3d11ff4aaf77cc30f331588ac22d00f38

  • SHA256

    b8587aa8266f54f19957e82df6402ebc56e77f77bd1614ceeee91b9cd8b5b4b4

  • SHA512

    227f9227ccf4f7849f8819fff109b263c61abd074ce9bf956f6b2dfc47a72b14c09d7df1f8f7bff9c40c9fe43cc6f530c5f97425c4eccce9553bfc7f0bc1194e

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pnug

Decoy

natureate.com

ita-pots.website

sucohansmushroom.com

produrielrosen.com

gosystemupdatenow.online

jiskra.art

janwiench.com

norfolkfoodhall.com

iloveaddictss.com

pogozip.com

buyinstapva.com

teardirectionfreedom.xyz

0205168.com

apaixonadosporpugs.online

jawscoinc.com

crafter.quest

wikipedianow.com

radiopuls.net

kendama-co.com

goodstudycanada.com

Targets

    • Target

      RFQ SHEET .xlsx

    • Size

      310KB

    • MD5

      f1f0cc08d95ede93773d5c81ca809905

    • SHA1

      418aadf3d11ff4aaf77cc30f331588ac22d00f38

    • SHA256

      b8587aa8266f54f19957e82df6402ebc56e77f77bd1614ceeee91b9cd8b5b4b4

    • SHA512

      227f9227ccf4f7849f8819fff109b263c61abd074ce9bf956f6b2dfc47a72b14c09d7df1f8f7bff9c40c9fe43cc6f530c5f97425c4eccce9553bfc7f0bc1194e

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks