General

  • Target

    order request.exe

  • Size

    563KB

  • Sample

    220203-rf5rtaacck

  • MD5

    fae7b5f628a7c1642f1d22bc4dde9369

  • SHA1

    cae7c670a8def01cbb693f972174a8489a0ee2bc

  • SHA256

    d368e6da00a94aa2a44145cde60d85f8b29cf8634893769f243f503524e24043

  • SHA512

    51aa5c7e886419f970259268aec5201c81fad9fbc3780192c60111745ab6807f1fe8940d80abca985c03ce434c92458b38489eaf1a1620f9eacec33153e7af9f

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

s9ne

Decoy

digital-performance-award.com

fioratti.xyz

designluxre.com

cngangdun.com

restaurantperladelmare.com

davinci65.info

glossmans.com

firstsmileimaging.com

indevmobility.biz

mvptcodesupport.com

crustenc.net

raleighsportsacademy.com

boytoyporn.com

rojaspass.com

acmepaysage.fr

shopatdean.xyz

leonergsteve18870.com

elnahuel.com

ils.network

canto-libero.com

Targets

    • Target

      order request.exe

    • Size

      563KB

    • MD5

      fae7b5f628a7c1642f1d22bc4dde9369

    • SHA1

      cae7c670a8def01cbb693f972174a8489a0ee2bc

    • SHA256

      d368e6da00a94aa2a44145cde60d85f8b29cf8634893769f243f503524e24043

    • SHA512

      51aa5c7e886419f970259268aec5201c81fad9fbc3780192c60111745ab6807f1fe8940d80abca985c03ce434c92458b38489eaf1a1620f9eacec33153e7af9f

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Sets service image path in registry

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks