General

  • Target

    vbc.exeivgijkfx

  • Size

    842KB

  • Sample

    220422-av8ctaeehn

  • MD5

    d1313aa99a8d454aa0d3b728a67dd331

  • SHA1

    81098d77f90fe9cb7f8953345c7385c35597bdfd

  • SHA256

    b85b6101f5f24710f8c9d5a32a4fa4194c55d1088c8722b08653aac9e6a3007a

  • SHA512

    55591756ffcd8442766800b95ba472a3dc8cd1d01e30b65ab146b48b4911ac4b05433c4204f237964720dfffa96af9c218569b81f79d4b14d4c70b9a7f1cd56f

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

arh2

Decoy

anniversaryalert.com

kinship.space

buabdullagroup.com

ghostprotectionagency.com

scion-go-getter.com

skindeepapp.com

kysp3.xyz

bonitaspringshomesearch.com

bestdeals2022.online

themarketingstinger.com

chengkayouxuan.com

fendoremi.com

j-stra.com

klingelecn.net

deluxecarepro.com

huanbaodg.com

mes-dents-blanches.com

solutionsemissionsimplifiee.com

abedbashir.tech

good-collection.store

Targets

    • Target

      vbc.exeivgijkfx

    • Size

      842KB

    • MD5

      d1313aa99a8d454aa0d3b728a67dd331

    • SHA1

      81098d77f90fe9cb7f8953345c7385c35597bdfd

    • SHA256

      b85b6101f5f24710f8c9d5a32a4fa4194c55d1088c8722b08653aac9e6a3007a

    • SHA512

      55591756ffcd8442766800b95ba472a3dc8cd1d01e30b65ab146b48b4911ac4b05433c4204f237964720dfffa96af9c218569b81f79d4b14d4c70b9a7f1cd56f

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Command-Line Interface

1
T1059

Defense Evasion

File Permissions Modification

1
T1222

Scripting

1
T1064

Discovery

System Information Discovery

1
T1082

Tasks