General

  • Target

    DHL Delivery Documents.exe

  • Size

    78KB

  • Sample

    220131-ss4wqaabc3

  • MD5

    94743aae8b0eb58bf9849035dc640b3c

  • SHA1

    089f398df4eb9cf0511038cff177ecd3fbc9715c

  • SHA256

    b34bc888551b9a603edf76a356a4c0fc290fac420d3c6df0decd0916970bfb9b

  • SHA512

    23b72e99ec9ad81a97d3b4902c020c7f27b3b156ca81bc5c818f9ecd88b40f6cfb3b9b436511e952de31a9c7841cf80e9019c0ad2a54d075ba5f1bf7e9e562b0

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

zqzw

Decoy

laurentmathieu.com

nohohonndana.com

hhmc.info

shophallows.com

blazebunk.com

goodbridge.xyz

flakycloud.com

bakermckenziegroups.com

formation-adistance.com

lovingearthbotanicals.com

tbrservice.plus

heritagehousehotels.com

drwbuildersco.com

lacsghb.com

wain3x.com

dadreview.club

continiutycp.com

cockgirls.com

48mpt.xyz

033skz.xyz

Targets

    • Target

      DHL Delivery Documents.exe

    • Size

      78KB

    • MD5

      94743aae8b0eb58bf9849035dc640b3c

    • SHA1

      089f398df4eb9cf0511038cff177ecd3fbc9715c

    • SHA256

      b34bc888551b9a603edf76a356a4c0fc290fac420d3c6df0decd0916970bfb9b

    • SHA512

      23b72e99ec9ad81a97d3b4902c020c7f27b3b156ca81bc5c818f9ecd88b40f6cfb3b9b436511e952de31a9c7841cf80e9019c0ad2a54d075ba5f1bf7e9e562b0

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Sets service image path in registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks