General

  • Target

    PO-SKM16204.xlsx

  • Size

    187KB

  • Sample

    220217-vtsaescdc5

  • MD5

    dce483138ae7a79d5ca283aa65b8bea7

  • SHA1

    ae77a002fc095eb56fdb9bf30c689adfd9a29fc2

  • SHA256

    6234b22b81f55ce005b34b03c6ed94273060a0d0644728753c7c1651eeebac51

  • SHA512

    93bcfedc054acb142c28ce6f1f4355b50779620b79745e7e1f7bc8032b2c3585deab4a2e26690d08902ff7192c50a16ee718c32883b5fdc55e52b4592267393c

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Targets

    • Target

      PO-SKM16204.xlsx

    • Size

      187KB

    • MD5

      dce483138ae7a79d5ca283aa65b8bea7

    • SHA1

      ae77a002fc095eb56fdb9bf30c689adfd9a29fc2

    • SHA256

      6234b22b81f55ce005b34b03c6ed94273060a0d0644728753c7c1651eeebac51

    • SHA512

      93bcfedc054acb142c28ce6f1f4355b50779620b79745e7e1f7bc8032b2c3585deab4a2e26690d08902ff7192c50a16ee718c32883b5fdc55e52b4592267393c

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks