General

  • Target

    doc87654345678765456700876.xlsx

  • Size

    172KB

  • Sample

    220707-g5f5msedfj

  • MD5

    1a655288d3217735e89fd31c24d1d740

  • SHA1

    6361b7bb9693d3cf23a8c4c8b915f03e2ef67e69

  • SHA256

    0040f5c1c1699e37a9a422b1446ec89c28ebbbc81baaa7e17cc5ca722751eb5a

  • SHA512

    80349162d9ec866539ccd3cc11051451128bb33fa82f07ce6f5ff603df1d5c194e4d4df1c88a05e66ce01bd292e1404f00f624d0616f1d5d16e5c295c6baa54f

Malware Config

Extracted

Family

xloader

Version

2.7

Campaign

n5mz

Decoy

ezhuilike.com

broomstickrum.com

ramaniclothing.com

midbots.com

rlxscpe.com

elanagro.online

chahuajie.com

digipubcity.com

predatorstoppers.com

savas-jewelry.com

timinis23.com

homesteaddesignstudio.net

bellezadehoy.online

disintar.xyz

sharinks.tech

redfoxdetroit.com

resscoptheron.com

aspiritualgiftshoppe.com

tematemazo.com

assasa.net

Targets

    • Target

      doc87654345678765456700876.xlsx

    • Size

      172KB

    • MD5

      1a655288d3217735e89fd31c24d1d740

    • SHA1

      6361b7bb9693d3cf23a8c4c8b915f03e2ef67e69

    • SHA256

      0040f5c1c1699e37a9a422b1446ec89c28ebbbc81baaa7e17cc5ca722751eb5a

    • SHA512

      80349162d9ec866539ccd3cc11051451128bb33fa82f07ce6f5ff603df1d5c194e4d4df1c88a05e66ce01bd292e1404f00f624d0616f1d5d16e5c295c6baa54f

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • ModiLoader Second Stage

    • Xloader Payload

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks