General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.19438.29162

  • Size

    393KB

  • Sample

    220617-f8va1aaegj

  • MD5

    5b696400216967545b512c498c1e5086

  • SHA1

    f968a02346a39e5484ea9280382c9c0d7d77f13f

  • SHA256

    6959e78db6f5ebf3c0c86c05868e281a3013cdfcc3a57440ec8a24ab43506af8

  • SHA512

    061c66a085991cd935cea68460556d7431c611de648413dffd49a420bc5fef06cd5b2a28dcafc041f5c63857b1a422ef5206f38900439234c84c7789a993357b

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

tn61

Decoy

ryliehorrall.art

mesdco.net

street-art-ink.com

sepetcin.com

stilghar.com

hawaiipooltiles.com

fuerst-von-falkennest.com

totalvirtue.com

xdk0blc0tqy6a7.life

zootowngravel.com

kreditkarten-optionde.com

6888tlbb.xyz

albertakleekai.com

travelnurseinfofinder3.life

valleyinnswat.com

secure-remove-devices.com

digitalswamy.com

www112casinova.com

medifasttrd.com

distritoxermar.com

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.19438.29162

    • Size

      393KB

    • MD5

      5b696400216967545b512c498c1e5086

    • SHA1

      f968a02346a39e5484ea9280382c9c0d7d77f13f

    • SHA256

      6959e78db6f5ebf3c0c86c05868e281a3013cdfcc3a57440ec8a24ab43506af8

    • SHA512

      061c66a085991cd935cea68460556d7431c611de648413dffd49a420bc5fef06cd5b2a28dcafc041f5c63857b1a422ef5206f38900439234c84c7789a993357b

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks