General

  • Target

    2710-22BH.xlsx

  • Size

    188KB

  • Sample

    220404-pyhc5aaddn

  • MD5

    e700a429e48c230e50b1c7f444352464

  • SHA1

    e39110541a277e48899a2918d0ae2d08606a08b4

  • SHA256

    4c402f8b029ece3a959db4fbacd3a13e94ecc89bb55d9c28d376b680cdf50862

  • SHA512

    08e33d80d98bd204f355db212f50319f4b2665976d6292284b5e534e6e65d175a34ead56f7da56fccf88734e18d33eb37d1e42b19d5d3004e12fde5cb56664d5

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Targets

    • Target

      2710-22BH.xlsx

    • Size

      188KB

    • MD5

      e700a429e48c230e50b1c7f444352464

    • SHA1

      e39110541a277e48899a2918d0ae2d08606a08b4

    • SHA256

      4c402f8b029ece3a959db4fbacd3a13e94ecc89bb55d9c28d376b680cdf50862

    • SHA512

      08e33d80d98bd204f355db212f50319f4b2665976d6292284b5e534e6e65d175a34ead56f7da56fccf88734e18d33eb37d1e42b19d5d3004e12fde5cb56664d5

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks