General

  • Target

    83a7bc433af5ec1932f11463e1ae0e71

  • Size

    243KB

  • Sample

    220707-f82p3sdgeq

  • MD5

    83a7bc433af5ec1932f11463e1ae0e71

  • SHA1

    53d569247f99f9e396ebf1f959d08aaa95f36b0b

  • SHA256

    db34ecda191eef85c0e05495f658c72a870cb02a65128a56626b2b53468977ec

  • SHA512

    2142191ecf7b2690e233a19180b3a4b10da662694fbabfd7092a77a49ad1123c2b4d67c10526de11a49212b9540149d63ede436694b1e714f183de56392f8194

Malware Config

Extracted

Family

xloader

Version

2.9

Campaign

iewb

Decoy

n8FLlgIlb1rSEg5hJ9xMbw4hcmR38Q==

5vIAIY+pt81OtWs+FdIEdk7Y

LHIKc+oWGIQUUlfAAtEEdk7Y

ePM/cX2jvHrS

5hvPEw22+fdvmJz3C8FIVq0=

mb9EeX2jvHrS

Dx2zIYNvfjo8VUo5

6jVPnyJekv2RAc4gLKNwEqQ=

KWatHyjdE5Gj1Ng=

t9lk70gzUAZty4qjbVjF

6eUBeFPzKBWT125BFNIEdk7Y

dZUXOIyqTJGj1Ng=

iL3TVh2Jl5QVStnzxcAhIL8=

J1prtyklUfZGR/xDD71IbkWRd2yx

s9FgCOBRW9bU0Y6jbVjF

RYCbQDzcFBhcylgu

Fl0BV/8RJm6F9QRg8LXXTLo=

0dhumHzrCCZ3wdQg7nFF1AlL6Tk=

xvL+iL6wwX+/wH9K4lbZ/A==

N0lVceIFD5Gj1Ng=

Targets

    • Target

      MV TRUONG MINH SEA.xlsx

    • Size

      176KB

    • MD5

      bfc885ac8275d3a48401b4fade16bb93

    • SHA1

      0aab3160b4ea537f39253eaa67fe5491a99d72fd

    • SHA256

      af90961d9204c394bf5e3063e42ef2541160aaff6029c0bbd68499400c79a7ed

    • SHA512

      6e6624823b3d4f6988840df7491f468333044f7410ab2684c47a4db4cfa5dbfb3a9e28e41813abbf37f762cb5a32dbed0b2e7b8fe1b7c9baba6b413a64737170

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks