General

  • Target

    EX775380705313.doc__.rtf

  • Size

    384KB

  • Sample

    211213-sjgd3aehcp

  • MD5

    99f1bdd67c558c943d6ba062bc327d28

  • SHA1

    3694f22edb747d065595c4760fa25119581a43f1

  • SHA256

    0efd3949bdca68716bd115e68de2f6247135e19dca8ff9e300eea9c7e9b4260f

  • SHA512

    a64d3834bec69ed63a00c77de68b12a11d48362f1772e926afea29f6b203c1d17c93bb3d4bc1956f32ac0a6bdb4a918ffc0f1437399c38e97ea923a2389989a0

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

b62n

C2

http://www.multidetoxhepatico.com/b62n/

Decoy

childzplanet.com

nine8culture.com

yourfoodmenu.com

nxhxyzjy.com

nobelies.com

baetsupreme.net

indiadiscountedfares.com

iconnect-design.com

durston.store

sweetcreationsbyjp.com

ktieman.com

getvirtualaddress.com

cryptopoly-figures.com

minismi2.com

ricemoment.com

regionalhomescommercial.com

onelike.biz

d22.group

kwissleapp.com

cindyrandband.com

Targets

    • Target

      EX775380705313.doc__.rtf

    • Size

      384KB

    • MD5

      99f1bdd67c558c943d6ba062bc327d28

    • SHA1

      3694f22edb747d065595c4760fa25119581a43f1

    • SHA256

      0efd3949bdca68716bd115e68de2f6247135e19dca8ff9e300eea9c7e9b4260f

    • SHA512

      a64d3834bec69ed63a00c77de68b12a11d48362f1772e926afea29f6b203c1d17c93bb3d4bc1956f32ac0a6bdb4a918ffc0f1437399c38e97ea923a2389989a0

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Tasks