General

  • Target

    SKMB60219.xlsx

  • Size

    186KB

  • Sample

    220311-cez3lshfdn

  • MD5

    96d7d76083a4a671520fc66cef8b117c

  • SHA1

    2eb64b5ac52b4bffc75a180c051c26b2a6140f43

  • SHA256

    b3280e9402e6172764449daedc9e687fbe7b474fd7a45d9756c588d1fa2b1fe2

  • SHA512

    53b3f6f86f0fcb5eb8f3d9fb0babf94bcc358b4f9daf2aadd47c5eb2e796683b03ede312d877eaa1968b3c90ffc0d15ac958d1b0743403faf440365141bd26b9

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Targets

    • Target

      SKMB60219.xlsx

    • Size

      186KB

    • MD5

      96d7d76083a4a671520fc66cef8b117c

    • SHA1

      2eb64b5ac52b4bffc75a180c051c26b2a6140f43

    • SHA256

      b3280e9402e6172764449daedc9e687fbe7b474fd7a45d9756c588d1fa2b1fe2

    • SHA512

      53b3f6f86f0fcb5eb8f3d9fb0babf94bcc358b4f9daf2aadd47c5eb2e796683b03ede312d877eaa1968b3c90ffc0d15ac958d1b0743403faf440365141bd26b9

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks