General

  • Target

    PO4534526726837.DOC.zip

  • Size

    393KB

  • Sample

    220126-pf2ztadag3

  • MD5

    8874d3c953923c1dbc0f5493869b471c

  • SHA1

    e1f48e4b000421482b11c6a0672db0537f0eb804

  • SHA256

    06dfe3d2a7de63ffba2e7e6cc787a8f79f8cc7a46c3653ea4249360f36db4547

  • SHA512

    807b287b7c175efe766bcc8cc1b83c9c76589d340802074f4939283d0ae9f855ac646e4b859dd0978a250b93e0dc3ee81b4ea871101f8093b78c44509f6dcec8

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pvxz

Decoy

imt-token.club

abravewayocen.online

shcloudcar.com

mshoppingworld.online

ncgf08.xyz

stuinfo.xyz

wesavetheplanetofficial.com

tourbox.xyz

believeinyourselftraining.com

jsboyat.com

aaeconomy.info

9etmorea.info

purosepeti7.com

goticketly.com

pinkmemorypt.com

mylifewellnesscentre.com

iridina.online

petrestore.online

neema.xyz

novelfooditalia.com

Targets

    • Target

      U prilogu je predracun.exe

    • Size

      779KB

    • MD5

      3fc1d6d6ead9c444d3a444484b339318

    • SHA1

      100a7fc3b0839885d31f4a51690ec5d4630c71c6

    • SHA256

      f69c67cbf4e8f7e6d0f9157de994b80e6eb0f7b251dcc461940d51659055640f

    • SHA512

      289f4fecde499abd04102bcf8c79e126cc850b8f43f906114937837a1b5179d99b651c91281b6672853fbddb300588ed7c43eb797c7fb8dfc822b54658d11eab

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • ModiLoader First Stage

    • Xloader Payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks