General

  • Target

    document.docdgklfwia

  • Size

    21KB

  • Sample

    220425-1vg4qsecd9

  • MD5

    7eaf1191dd524f013b3da5637cc65020

  • SHA1

    83f34f15b36102026280e53cb2b44cbb24f03104

  • SHA256

    177d47fb1686f807548d86cccc3c1783125a02b197e827981e842a7fe273fd13

  • SHA512

    670f3fe1878a7e478321e3c7baf2c8833891b03bfd56afbfa7bcc9cf4b81be3ecda12c51a3866c75ae18bc7074f5408a334eaf4db67d5d466a48ae390889f702

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

a2c8

Decoy

sethdukes.online

hustl-hk.com

alienspacebabes.com

yitongbag.com

adlichoob.com

wejust5.com

wwwsnapfinancial.com

patriotcapitalgroupllc.com

divaconnectionbuild.com

adventureventures.net

jaromer.net

closureservices.com

sdc-english.com

fleet-lab.com

gtgits.com

clinicaorion.com

deleaderainfluenceur.com

honghuamach.net

638661.com

sleepgenies.info

Targets

    • Target

      document.docdgklfwia

    • Size

      21KB

    • MD5

      7eaf1191dd524f013b3da5637cc65020

    • SHA1

      83f34f15b36102026280e53cb2b44cbb24f03104

    • SHA256

      177d47fb1686f807548d86cccc3c1783125a02b197e827981e842a7fe273fd13

    • SHA512

      670f3fe1878a7e478321e3c7baf2c8833891b03bfd56afbfa7bcc9cf4b81be3ecda12c51a3866c75ae18bc7074f5408a334eaf4db67d5d466a48ae390889f702

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks