General

  • Target

    vbc.exe

  • Size

    245KB

  • Sample

    220823-ksf6nacccm

  • MD5

    ef533fcd6ac70ba2cfb2f01533d60c86

  • SHA1

    53dcca26866ec818f1026e1102cb29baa2176028

  • SHA256

    4b83d8290663d49dfe64fc7f3093f201141f0d88633afe73322b552f9d08e76c

  • SHA512

    85715a7f2d0338c07c3dd9ae4d0b3abca2f8594fb65f988afd8da8e2d53d19e681e39f90126a38c19a3b08f6ce6253a72a85ba601a5936047642b7bb86e0367c

  • SSDEEP

    6144:4ETJvWU8Wbvo/31KdxE62MwejkyhOLjMsi4W77:48vWUz81aE62ScvpW77

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

zgtb

Decoy

gabriellep.com

honghe4.xyz

anisaofrendas.com

happy-tile.com

thesulkies.com

international-ipo.com

tazeco.info

hhhzzz.xyz

vrmonster.xyz

theearthresidencia.com

sportape.xyz

elshadaibaterias.com

koredeiihibi.com

taxtaa.com

globalcityb.com

fxivcama.com

dagsmith.com

elmar-bhp.com

peakice.net

jhcdjewelry.com

Targets

    • Target

      vbc.exe

    • Size

      245KB

    • MD5

      ef533fcd6ac70ba2cfb2f01533d60c86

    • SHA1

      53dcca26866ec818f1026e1102cb29baa2176028

    • SHA256

      4b83d8290663d49dfe64fc7f3093f201141f0d88633afe73322b552f9d08e76c

    • SHA512

      85715a7f2d0338c07c3dd9ae4d0b3abca2f8594fb65f988afd8da8e2d53d19e681e39f90126a38c19a3b08f6ce6253a72a85ba601a5936047642b7bb86e0367c

    • SSDEEP

      6144:4ETJvWU8Wbvo/31KdxE62MwejkyhOLjMsi4W77:48vWUz81aE62ScvpW77

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks