General

  • Target

    tmp/26da8ebb14184edf1c85c0d5981d81e441847856cdac50d5efe108a5e3424829.xls

  • Size

    301KB

  • Sample

    220117-q9nvqaahal

  • MD5

    27307aea0f6f1b4b37f1e9949710d6f1

  • SHA1

    249f3fe9f387feb6abf8323043705d367063b1aa

  • SHA256

    26da8ebb14184edf1c85c0d5981d81e441847856cdac50d5efe108a5e3424829

  • SHA512

    e6847c0c946dfafbc57c2933af0e6fb4e32b44edab75a0750509c9b3b16331b0b3a4db1a9bf247d86f8d47ea2365c6e4f32d2cf36d093db9c2e4fe8b920285ae

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

nt3f

Decoy

tricyclee.com

kxsw999.com

wisteria-pavilion.com

bellaclancy.com

promissioskincare.com

hzy001.xyz

checkouthomehd.com

soladere.com

point4sales.com

socalmafia.com

libertadysarmiento.online

nftthirty.com

digitalgoldcryptostock.net

tulekiloscaird.com

austinfishandchicken.com

wlxxch.com

mgav51.xyz

landbanking.global

saprove.com

babyfaces.skin

Targets

    • Target

      tmp/26da8ebb14184edf1c85c0d5981d81e441847856cdac50d5efe108a5e3424829.xls

    • Size

      301KB

    • MD5

      27307aea0f6f1b4b37f1e9949710d6f1

    • SHA1

      249f3fe9f387feb6abf8323043705d367063b1aa

    • SHA256

      26da8ebb14184edf1c85c0d5981d81e441847856cdac50d5efe108a5e3424829

    • SHA512

      e6847c0c946dfafbc57c2933af0e6fb4e32b44edab75a0750509c9b3b16331b0b3a4db1a9bf247d86f8d47ea2365c6e4f32d2cf36d093db9c2e4fe8b920285ae

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks