Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
XLoader can utilize hardcoded command and control domain configurations created by the XLoader authors. These are designed to mimic domain registrars and hosting service providers such as Hostinger and Namecheap.[3] |
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
XLoader uses HTTP and HTTPS for command and control communication.[5] |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
XLoader establishes persistence by copying its executable in a subdirectory of |
Enterprise | T1185 | Browser Session Hijacking |
XLoader can conduct form grabbing, steal cookies, and extract data from HTTP sessions.[5] |
|
Enterprise | T1115 | Clipboard Data |
XLoader can collect data stored in the victim's clipboard.[5][6] |
|
Enterprise | T1059 | .010 | Command and Scripting Interpreter: AutoHotKey & AutoIT |
XLoader can use an AutoIT script to decrypt a payload file, load it into victim memory, then execute it on the victim machine.[5] |
Enterprise | T1555 | Credentials from Password Stores |
XLoader can collect credentials stored in email clients.[5][6] |
|
.003 | Credentials from Web Browsers |
XLoader can gather credentials from several web browsers.[1][5][6] |
||
Enterprise | T1622 | Debugger Evasion |
XLoader uses anti-debugging mechanisms such as calling |
|
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
XLoader uses XOR and RC4 algorithms to decrypt payloads and functions.[1] XLoader can be distributed as a self-extracting RAR archive that launches an AutoIT loader.[5] |
|
Enterprise | T1203 | Exploitation for Client Execution |
XLoader has exploited Office vulnerabilities during local execution such as CVE-2017-11882 and CVE-2018-0798.[6] |
|
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
XLoader loads a copy of NTDLL to evade hooks from security monitoring tools on this library.[1] XLoader can add the path of its executable to the Microsoft Defender exclusion list.[6] |
Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
XLoader can delete malicious executables from compromised machines.[4] |
Enterprise | T1056 | .001 | Input Capture: Keylogging | |
Enterprise | T1106 | Native API |
XLoader uses the native Windows API for functionality, including defense evasion.[1] |
|
Enterprise | T1027 | .002 | Obfuscated Files or Information: Software Packing |
XLoader uses various packers, including CyaX, to obfuscate malicious executables.[6] |
.013 | Obfuscated Files or Information: Encrypted/Encoded File |
XLoader features encrypted functions using the RC4 algorithm and bytecode operations.[1][2] |
||
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
XLoader has been delivered as a phishing attachment, including PDFs with embedded links, Word and Excel files, and various archive files (ZIP, RAR, ACE, and ISOs) containing EXE payloads.[5][4] |
Enterprise | T1055 | .004 | Process Injection: Asynchronous Procedure Call |
XLoader injects code into the APC queue using |
.012 | Process Injection: Process Hollowing |
XLoader uses process hollowing by injecting itself into the |
||
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | |
Enterprise | T1113 | Screen Capture | ||
Enterprise | T1539 | Steal Web Session Cookie |
XLoader can capture web session cookies and session information from victim browsers.[5] |
|
Enterprise | T1082 | System Information Discovery |
XLoader can collect system information and supported language information from the victim machine.[4] |
|
Enterprise | T1033 | System Owner/User Discovery | ||
Enterprise | T1529 | System Shutdown/Reboot | ||
Enterprise | T1497 | Virtualization/Sandbox Evasion |
XLoader can utilize decoy command and control domains within the malware configuration to circumvent sandbox analysis.[2][3] |
|
.001 | System Checks |
XLoader performs timing checks using the Read-Time Stamp Counter (RDTSC) instruction on the victim CPU.[5] |