General

  • Target

    INQUIRY_34873773844.xlsx

  • Size

    185KB

  • Sample

    220302-vm1yzsffg8

  • MD5

    f9533cc48bd2177b91822d72fe7bc42e

  • SHA1

    f5ed45224313f6f2bc97bbf7620b70f7ecfe048a

  • SHA256

    70c5d2c3fad16c3330325710efd43277570d26a84065c26a6fc7d9a248995e5d

  • SHA512

    8a84f3762f72dacd355f07cd89100ad30f0d215ebadda15a2d51c44040299fd5621ea59ad6c21ce9863089d4b9002b33f084aa7e26ce70c7b80b09b14e36addf

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Targets

    • Target

      INQUIRY_34873773844.xlsx

    • Size

      185KB

    • MD5

      f9533cc48bd2177b91822d72fe7bc42e

    • SHA1

      f5ed45224313f6f2bc97bbf7620b70f7ecfe048a

    • SHA256

      70c5d2c3fad16c3330325710efd43277570d26a84065c26a6fc7d9a248995e5d

    • SHA512

      8a84f3762f72dacd355f07cd89100ad30f0d215ebadda15a2d51c44040299fd5621ea59ad6c21ce9863089d4b9002b33f084aa7e26ce70c7b80b09b14e36addf

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks