General

  • Target

    Order-807190402-pdf.pif

  • Size

    246KB

  • Sample

    220201-m31ddsdgb6

  • MD5

    68c5e001f8dae53bce2daf4d5480302a

  • SHA1

    697411019d83f22261b31723f994970c33dc1a20

  • SHA256

    b3273dbf7bad4f225c15fbd7728ee709d8ccb1d2e57a3a9942dbc758d2b97c0f

  • SHA512

    155ff406482ff0273b4eb5a18dfc63e36e9ebb4488224acb3b226a3d042d3266ee71c87784776df8059f69bd32cb98b34a79332bb048ecd5f9f43a4f3591745c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Targets

    • Target

      Order-807190402-pdf.pif

    • Size

      246KB

    • MD5

      68c5e001f8dae53bce2daf4d5480302a

    • SHA1

      697411019d83f22261b31723f994970c33dc1a20

    • SHA256

      b3273dbf7bad4f225c15fbd7728ee709d8ccb1d2e57a3a9942dbc758d2b97c0f

    • SHA512

      155ff406482ff0273b4eb5a18dfc63e36e9ebb4488224acb3b226a3d042d3266ee71c87784776df8059f69bd32cb98b34a79332bb048ecd5f9f43a4f3591745c

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Sets service image path in registry

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks