Resubmissions

16-02-2022 14:43

220216-r31flsdagq 10

16-02-2022 14:37

220216-rzmeksdagk 10

16-02-2022 14:22

220216-rpkg8sdafl 10

General

  • Target

    DELIVERY DOCUMENTS.exe

  • Size

    707KB

  • Sample

    220216-rzmeksdagk

  • MD5

    427ef5f4e1143ad34c33b26dc4681661

  • SHA1

    673fb1a58e4707ad783d03ca97b3fbd8b4cad73a

  • SHA256

    cd4ee025ad3406b7e572952d42465eee19649cef6c0d3a6acbb0e972096988f4

  • SHA512

    b225afbb07853516f1b741e833e1a63026c0dc5adbb0c3fcfb48f8c6681bc770558499df3d3f5c17df45395dedc3624a1e8fa6498395ac20a82f44e27a61dfbb

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

zqzw

Decoy

laurentmathieu.com

nohohonndana.com

hhmc.info

shophallows.com

blazebunk.com

goodbridge.xyz

flakycloud.com

bakermckenziegroups.com

formation-adistance.com

lovingearthbotanicals.com

tbrservice.plus

heritagehousehotels.com

drwbuildersco.com

lacsghb.com

wain3x.com

dadreview.club

continiutycp.com

cockgirls.com

48mpt.xyz

033skz.xyz

Targets

    • Target

      DELIVERY DOCUMENTS.exe

    • Size

      707KB

    • MD5

      427ef5f4e1143ad34c33b26dc4681661

    • SHA1

      673fb1a58e4707ad783d03ca97b3fbd8b4cad73a

    • SHA256

      cd4ee025ad3406b7e572952d42465eee19649cef6c0d3a6acbb0e972096988f4

    • SHA512

      b225afbb07853516f1b741e833e1a63026c0dc5adbb0c3fcfb48f8c6681bc770558499df3d3f5c17df45395dedc3624a1e8fa6498395ac20a82f44e27a61dfbb

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Xloader Payload

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks