General

  • Target

    vbc.exebflxcjvf

  • Size

    283KB

  • Sample

    220626-gws3vabee5

  • MD5

    3003d7f5f37555dda6aaedc46ebffb6e

  • SHA1

    2fc3bfb42f58a9c1c6c9383015347b9c8935d14f

  • SHA256

    2fad61e5630cde696d8ea57db27d521ed4ff87ae0c5e692c597171439ae6d01c

  • SHA512

    c9df0576f1f92639c69c79cd230ce80a4b8606791e0be99660fb119e207ff894b6c10f31fbba70699dc7e296c8e061130e5eb765e2eef521e602a8918f32e050

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

tn61

Decoy

ryliehorrall.art

mesdco.net

street-art-ink.com

sepetcin.com

stilghar.com

hawaiipooltiles.com

fuerst-von-falkennest.com

totalvirtue.com

xdk0blc0tqy6a7.life

zootowngravel.com

kreditkarten-optionde.com

6888tlbb.xyz

albertakleekai.com

travelnurseinfofinder3.life

valleyinnswat.com

secure-remove-devices.com

digitalswamy.com

www112casinova.com

medifasttrd.com

distritoxermar.com

Targets

    • Target

      vbc.exebflxcjvf

    • Size

      283KB

    • MD5

      3003d7f5f37555dda6aaedc46ebffb6e

    • SHA1

      2fc3bfb42f58a9c1c6c9383015347b9c8935d14f

    • SHA256

      2fad61e5630cde696d8ea57db27d521ed4ff87ae0c5e692c597171439ae6d01c

    • SHA512

      c9df0576f1f92639c69c79cd230ce80a4b8606791e0be99660fb119e207ff894b6c10f31fbba70699dc7e296c8e061130e5eb765e2eef521e602a8918f32e050

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Adds policy Run key to start application

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Tasks