General

  • Target

    Invoice.xlsx

  • Size

    187KB

  • Sample

    220126-l1823sbhh3

  • MD5

    f7b4878d83da4d4939368e5158bf2bb0

  • SHA1

    f09b8d22c2a836d8e8f5aca3800a791baa8a17a9

  • SHA256

    142827d15901c524c28ba06f1a07edb391d37d2bc29e4bf4c2d3d8aacc5db307

  • SHA512

    7a7a3d05e80fdaa3a0210ef0d290e6a669425ac1388fe5972fefe60e173af6d14a3b1eaba0302d9fa004152147aee963d3a5b5873d36141efadcbaabfa2ba884

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

nt3f

Decoy

tricyclee.com

kxsw999.com

wisteria-pavilion.com

bellaclancy.com

promissioskincare.com

hzy001.xyz

checkouthomehd.com

soladere.com

point4sales.com

socalmafia.com

libertadysarmiento.online

nftthirty.com

digitalgoldcryptostock.net

tulekiloscaird.com

austinfishandchicken.com

wlxxch.com

mgav51.xyz

landbanking.global

saprove.com

babyfaces.skin

Targets

    • Target

      Invoice.xlsx

    • Size

      187KB

    • MD5

      f7b4878d83da4d4939368e5158bf2bb0

    • SHA1

      f09b8d22c2a836d8e8f5aca3800a791baa8a17a9

    • SHA256

      142827d15901c524c28ba06f1a07edb391d37d2bc29e4bf4c2d3d8aacc5db307

    • SHA512

      7a7a3d05e80fdaa3a0210ef0d290e6a669425ac1388fe5972fefe60e173af6d14a3b1eaba0302d9fa004152147aee963d3a5b5873d36141efadcbaabfa2ba884

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks