General

  • Target

    NBC-INV-099834.exe

  • Size

    340KB

  • Sample

    220119-zq2f5sdbdm

  • MD5

    a53139d6d3f89d1d0d67d035c2c51bdf

  • SHA1

    73a571f0c3e5c6f08a69862c669b76c14feb90d0

  • SHA256

    d838565cacb24cf211b9d5f72bb302a65cdab4a9b5a741385ce5efdbbdff0098

  • SHA512

    d9c3acb3f127aef674b1d83084a687aafc1d25fb58efc43ad2c5c3d92c32289a94e59941ad1c1cccaef6d84e8857a12213326b0c118d856107f93b94602b8065

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

nt3f

Decoy

tricyclee.com

kxsw999.com

wisteria-pavilion.com

bellaclancy.com

promissioskincare.com

hzy001.xyz

checkouthomehd.com

soladere.com

point4sales.com

socalmafia.com

libertadysarmiento.online

nftthirty.com

digitalgoldcryptostock.net

tulekiloscaird.com

austinfishandchicken.com

wlxxch.com

mgav51.xyz

landbanking.global

saprove.com

babyfaces.skin

Targets

    • Target

      NBC-INV-099834.exe

    • Size

      340KB

    • MD5

      a53139d6d3f89d1d0d67d035c2c51bdf

    • SHA1

      73a571f0c3e5c6f08a69862c669b76c14feb90d0

    • SHA256

      d838565cacb24cf211b9d5f72bb302a65cdab4a9b5a741385ce5efdbbdff0098

    • SHA512

      d9c3acb3f127aef674b1d83084a687aafc1d25fb58efc43ad2c5c3d92c32289a94e59941ad1c1cccaef6d84e8857a12213326b0c118d856107f93b94602b8065

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks