General

  • Target

    61d62155465f85f8fc4d44a89e7ae831.exe

  • Size

    907KB

  • Sample

    211103-y3vcxscaem

  • MD5

    61d62155465f85f8fc4d44a89e7ae831

  • SHA1

    10e1e0c049b58ff662f960a3e5270bfb97c9868b

  • SHA256

    d6742c917817f02e01ba40c61606b3707f373bb8d1f525b75b72b1802cd9b290

  • SHA512

    b77514d0de8c8582a3773fd76b82049bdc8dbba090827531ff1452d6729bc74eeb389f69701bf38b8b45a7fcebec62d12c26d5abab7e0516bb5cf78dc7dbeb24

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

rqan

C2

http://www.cardboutiqueapp.com/rqan/

Decoy

panda.wiki

gailkannamassage.com

ungravitystudio.com

coraggiomusicschool.com

51walkerstreetrippleside.com

infemax.store

mapara-foundation.net

elitespeedwaxs.com

manateeprint.com

thelocksmithtradeshow.com

phoenix-out-of-ashes.com

marionkgregory.store

abasketofwords.com

century21nokta.com

anthonyaarnold.com

forevermyanmar.com

ramashi.com

uniquecarbonbrush.com

packecco.com

appelnacrtl.quest

Targets

    • Target

      61d62155465f85f8fc4d44a89e7ae831.exe

    • Size

      907KB

    • MD5

      61d62155465f85f8fc4d44a89e7ae831

    • SHA1

      10e1e0c049b58ff662f960a3e5270bfb97c9868b

    • SHA256

      d6742c917817f02e01ba40c61606b3707f373bb8d1f525b75b72b1802cd9b290

    • SHA512

      b77514d0de8c8582a3773fd76b82049bdc8dbba090827531ff1452d6729bc74eeb389f69701bf38b8b45a7fcebec62d12c26d5abab7e0516bb5cf78dc7dbeb24

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks