Resubmissions

28-02-2022 15:20

220228-sq37eaeee2 10

28-02-2022 15:15

220228-smwyxsfhdq 10

General

  • Target

    triage_dropped_file

  • Size

    339KB

  • Sample

    220228-sq37eaeee2

  • MD5

    e2b38d12aac4c0d8cc5ff6588158ed62

  • SHA1

    03ad689d9baee2a32943ae87f601fa624d2dc503

  • SHA256

    ab928039cd56672d5b9a02322f1d91793cc6fcd3b42217c00cc682a0a42d1620

  • SHA512

    ab105692c72406006e93a5b21fc612362e01477266af6bb4014cfb0f90d393b458a58c5139d2f59ca81f5ec5348077a2b1a2077f5fed486d87efdb872a9bdcae

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p2a5

Decoy

gorillaslovebananas.com

zonaextasis.com

digitalpravin.online

memorialdoors.com

departmenteindhoven.com

vipulb.com

ruyibao365.com

ynpzz.com

matthewandjessica.com

winfrey2024.com

janetride.com

arairazur.xyz

alltheheads.com

amayawebdesigns.com

califunder.com

blacksource.xyz

farmasi.agency

ilmkibahar.com

thinkcentury.net

eskortclub.com

Targets

    • Target

      triage_dropped_file

    • Size

      339KB

    • MD5

      e2b38d12aac4c0d8cc5ff6588158ed62

    • SHA1

      03ad689d9baee2a32943ae87f601fa624d2dc503

    • SHA256

      ab928039cd56672d5b9a02322f1d91793cc6fcd3b42217c00cc682a0a42d1620

    • SHA512

      ab105692c72406006e93a5b21fc612362e01477266af6bb4014cfb0f90d393b458a58c5139d2f59ca81f5ec5348077a2b1a2077f5fed486d87efdb872a9bdcae

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Tasks