General

  • Target

    PO34261725261.exe

  • Size

    1013KB

  • Sample

    221006-g5224sggek

  • MD5

    2709d2c140a55cd02b3a27e785fea7ee

  • SHA1

    691d67d383fee4927a94e1d2bc86f626624c6b9e

  • SHA256

    3930b93c51a49f62479fe5886e1ab60105a54824fbfafcd42a6d92405d944af1

  • SHA512

    5909e4882b12f2cafb08fc1a6bed2aeda780a4c0e41f3b0466467ccbe12c9f37f44c7b3c17a15711bcb61771d01210e06056923dd8916f4a1f8b7c3723547f32

  • SSDEEP

    12288:qkQHUxA6s8jEg3sQHniC4uSJdWoQE4/2EK73WLr9RZCqsP031kX3r5wuvYe+msn1:PjO8jEg3DHnyuSjxU3XjZpwzGz

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

euv4

Decoy

anniebapartments.com

hagenbicycles.com

herbalist101.com

southerncorrosion.net

kuechenpruefer.com

tajniezdrzi.quest

segurofunerarioar.com

boardsandbeamsdecor.com

alifdanismanlik.com

pkem.top

mddc.clinic

handejqr.com

crux-at.com

awp.email

hugsforbubbs.com

cielotherepy.com

turkcuyuz.com

teamidc.com

lankasirinspa.com

68135.online

Targets

    • Target

      PO34261725261.exe

    • Size

      1013KB

    • MD5

      2709d2c140a55cd02b3a27e785fea7ee

    • SHA1

      691d67d383fee4927a94e1d2bc86f626624c6b9e

    • SHA256

      3930b93c51a49f62479fe5886e1ab60105a54824fbfafcd42a6d92405d944af1

    • SHA512

      5909e4882b12f2cafb08fc1a6bed2aeda780a4c0e41f3b0466467ccbe12c9f37f44c7b3c17a15711bcb61771d01210e06056923dd8916f4a1f8b7c3723547f32

    • SSDEEP

      12288:qkQHUxA6s8jEg3sQHniC4uSJdWoQE4/2EK73WLr9RZCqsP031kX3r5wuvYe+msn1:PjO8jEg3DHnyuSjxU3XjZpwzGz

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • ModiLoader Second Stage

    • Xloader payload

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks