General

  • Target

    HIRE SOA FOR DEC_2021.exe

  • Size

    247KB

  • Sample

    220128-pt2wzadba2

  • MD5

    d8af2363d5a46336733b6121c0b4cf0e

  • SHA1

    fcb0ee44436230d924b2550fc9935ee76f2498fe

  • SHA256

    2a4415721925c12ce8a80719697ffbda5daf88fe34804b0549bc5d5605790cdb

  • SHA512

    e34f724dc4a7837ff86ed5d5214e1ed22e5643bbd45f881066b05b4ae4766a6330a48db8e4ef8dcee9ca8bf5ace43d987a667f62ea086992d2ff1ee24875889d

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

cxep

Decoy

estateglobal.info

loransstore.com

loginofy.com

fjallravenz.online

cefseguranca-app.com

safontadiestramiento.com

bubbleteapro.com

morethanmummies.com

serviciopersonalizadoweb.com

headerbidder.info

skworkforce.com

heightsorthodontics.com

chulavistapd.com

southjerseyautobody.net

chargedbygratitude.com

meltingpotspot.com

gdjiachen.com

luckdrawprogram.com

vintagepaseo.com

bequestslojyh.xyz

Targets

    • Target

      HIRE SOA FOR DEC_2021.exe

    • Size

      247KB

    • MD5

      d8af2363d5a46336733b6121c0b4cf0e

    • SHA1

      fcb0ee44436230d924b2550fc9935ee76f2498fe

    • SHA256

      2a4415721925c12ce8a80719697ffbda5daf88fe34804b0549bc5d5605790cdb

    • SHA512

      e34f724dc4a7837ff86ed5d5214e1ed22e5643bbd45f881066b05b4ae4766a6330a48db8e4ef8dcee9ca8bf5ace43d987a667f62ea086992d2ff1ee24875889d

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks