General

  • Target

    QUOTATION REQUEST - SUPPLY OF PRODUCTS - DTD JANUARY 2022PDF.xlsx

  • Size

    187KB

  • Sample

    220125-m7ex9aehe8

  • MD5

    60d3ade3f69380d4511b967cb46d8074

  • SHA1

    f59d67dba64addfb3a6c76c5d5ef8dceb89291eb

  • SHA256

    68169adeb038ace16ed5f3e0af92a7710f06badcb918db0c29f942df032ef439

  • SHA512

    6003e141180fefcb827e9b19a3f331142d401bf400dcdd4b2b18a56f6c4062a8f570d7687fed258a1d663f744a877a889b04e6fdb69652d280c2133f2191b31e

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pnug

Decoy

natureate.com

ita-pots.website

sucohansmushroom.com

produrielrosen.com

gosystemupdatenow.online

jiskra.art

janwiench.com

norfolkfoodhall.com

iloveaddictss.com

pogozip.com

buyinstapva.com

teardirectionfreedom.xyz

0205168.com

apaixonadosporpugs.online

jawscoinc.com

crafter.quest

wikipedianow.com

radiopuls.net

kendama-co.com

goodstudycanada.com

Targets

    • Target

      QUOTATION REQUEST - SUPPLY OF PRODUCTS - DTD JANUARY 2022PDF.xlsx

    • Size

      187KB

    • MD5

      60d3ade3f69380d4511b967cb46d8074

    • SHA1

      f59d67dba64addfb3a6c76c5d5ef8dceb89291eb

    • SHA256

      68169adeb038ace16ed5f3e0af92a7710f06badcb918db0c29f942df032ef439

    • SHA512

      6003e141180fefcb827e9b19a3f331142d401bf400dcdd4b2b18a56f6c4062a8f570d7687fed258a1d663f744a877a889b04e6fdb69652d280c2133f2191b31e

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Command-Line Interface

1
T1059

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks