General

  • Target

    6fba2f37c2fc582454bf979f26f76889

  • Size

    340KB

  • Sample

    220621-sartfaeedr

  • MD5

    6fba2f37c2fc582454bf979f26f76889

  • SHA1

    ef7bb2e8f6ab72f661497b47fef24e1f4dbc448a

  • SHA256

    9736dba9cb3ad13d528e02f4245e3c43a8d984fddf9a166aff7b0590473881cd

  • SHA512

    6d476964c4d15d9cacdc9918433fadab605cc28d41e3de4ff345bdc85fd9a94567c2f21f1abfb3aaaf79198cdca61d362a95a670413147415aea45e53d7489be

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

tn61

Decoy

ryliehorrall.art

mesdco.net

street-art-ink.com

sepetcin.com

stilghar.com

hawaiipooltiles.com

fuerst-von-falkennest.com

totalvirtue.com

xdk0blc0tqy6a7.life

zootowngravel.com

kreditkarten-optionde.com

6888tlbb.xyz

albertakleekai.com

travelnurseinfofinder3.life

valleyinnswat.com

secure-remove-devices.com

digitalswamy.com

www112casinova.com

medifasttrd.com

distritoxermar.com

Targets

    • Target

      PO.exe

    • Size

      393KB

    • MD5

      5b696400216967545b512c498c1e5086

    • SHA1

      f968a02346a39e5484ea9280382c9c0d7d77f13f

    • SHA256

      6959e78db6f5ebf3c0c86c05868e281a3013cdfcc3a57440ec8a24ab43506af8

    • SHA512

      061c66a085991cd935cea68460556d7431c611de648413dffd49a420bc5fef06cd5b2a28dcafc041f5c63857b1a422ef5206f38900439234c84c7789a993357b

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Xloader Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks