General

  • Target

    192.3.239.22_-_9000_-_document_invoice.doc___553058583012117df3bb047a83ec6129.dat

  • Size

    20KB

  • Sample

    220607-ktd3pacgf6

  • MD5

    553058583012117df3bb047a83ec6129

  • SHA1

    17c62c4a4580d55cac9cdd1ff6e01ea5fd9ef055

  • SHA256

    c7481ac4056524a4d60818692659188ff784c7f1f5a7333238ed08595a149add

  • SHA512

    3b6ac6e1ccca523e1929353dfff426bb93cd2c441a8f2da248637904f8c51f59318537704e915fcfd71bd2fa53b29546002cd7c0d58ff619cbf1928ad577a4c9

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

be4o

Decoy

laboratoriobioixcha.com

tictocperushop.online

wild-oceans.com

belaruscountry.com

kicktmall.com

fitcoinweb.tech

mores.one

gogear.one

gxrcksy.com

samrcq.com

impossible-icecream.com

bravesxx.com

bookchainart.com

sleepsolutionsofmboro.com

ocbrazilbusinessclub.com

advisor76.xyz

xitaotech.com

mgsdtytifgf3414.xyz

johnson-brown.net

cr3drt.com

Targets

    • Target

      192.3.239.22_-_9000_-_document_invoice.doc___553058583012117df3bb047a83ec6129.dat

    • Size

      20KB

    • MD5

      553058583012117df3bb047a83ec6129

    • SHA1

      17c62c4a4580d55cac9cdd1ff6e01ea5fd9ef055

    • SHA256

      c7481ac4056524a4d60818692659188ff784c7f1f5a7333238ed08595a149add

    • SHA512

      3b6ac6e1ccca523e1929353dfff426bb93cd2c441a8f2da248637904f8c51f59318537704e915fcfd71bd2fa53b29546002cd7c0d58ff619cbf1928ad577a4c9

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks