General

  • Target

    HSBC-SWIFT 05.07.2022.xlsx

  • Size

    176KB

  • Sample

    220705-pffrksahe5

  • MD5

    e5a13d1ba130b94576402fe59bdad693

  • SHA1

    7bfc2d69780f44d0db32eb201b80ea161291b097

  • SHA256

    db9f80d5e21c4915236c9c0d6081975ee5bac5d92d5ef82b193378f269b42ab2

  • SHA512

    53b34e56308248ec65e2fa94500237f97d8a6a789dcf282e8a19bc2ae48cf157648ed6662952decbce241958012020d88b16ab96699d49e6e41a68d65aea7314

Malware Config

Extracted

Family

xloader

Version

2.9

Campaign

wfc6

Decoy

FPF0BDtsP/0Z3N3EpIfSsQ==

wZbFgKkm5jUpFbB+GQ==

I/oJ0Jcb+eoMqQ==

w7zarxxnPcIgupA=

63SbUimyWalvjfJdRb9U

igCt44uCBYeAugeiTMZW

ZHJ4C8BlAvVDAIRo

XJUEKbSv5SVkKdCoWvkuKiQ=

TDPHixX7VMIgupA=

Xt5NdBkHqXeYgHtS6Lik7Sw=

rJKZiOi3mIr7iH5dEQ==

wbheFmd7+XMkt7KALN8A2NcT+npeUP+g

xqk06+lXAT3bemE847ik7Sw=

YS7SndCMWuCAFbB+GQ==

tJ4lxa1kPUfSZ4UiujZGLCQ=

j8gSmNPGzqe6

iQORUvIx0N1glkfomjmZCzmGPbKE/A==

dlD3cvHVcUBqgNrHpIfSsQ==

Sk9cCV2WvRkavg==

70RVeKQWsgOZMyf+0g0zKyM=

Targets

    • Target

      HSBC-SWIFT 05.07.2022.xlsx

    • Size

      176KB

    • MD5

      e5a13d1ba130b94576402fe59bdad693

    • SHA1

      7bfc2d69780f44d0db32eb201b80ea161291b097

    • SHA256

      db9f80d5e21c4915236c9c0d6081975ee5bac5d92d5ef82b193378f269b42ab2

    • SHA512

      53b34e56308248ec65e2fa94500237f97d8a6a789dcf282e8a19bc2ae48cf157648ed6662952decbce241958012020d88b16ab96699d49e6e41a68d65aea7314

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE MSIL/GenKryptik.FQRH Download Request

      suricata: ET MALWARE MSIL/GenKryptik.FQRH Download Request

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks