General

  • Target

    SGLN22060220.xlsx

  • Size

    79KB

  • Sample

    220622-sbk3aahdcj

  • MD5

    57efdb5c07a2948e09c3535d3b91fc72

  • SHA1

    974c2be9ff6499240c09b570e759e17b83061c68

  • SHA256

    a5985216525198346400da43be15f61b3ef5fcb784d6ebd43ddfc9e269704a68

  • SHA512

    e19b817387f494bea3a879e1d19a63d9a605e8d38f75e0650c64a389f78aca05245a5fdfe28f823b41439be6eabfbffcc7a5adbeeaea26bbd71b78a56135918f

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

tn61

Decoy

ryliehorrall.art

mesdco.net

street-art-ink.com

sepetcin.com

stilghar.com

hawaiipooltiles.com

fuerst-von-falkennest.com

totalvirtue.com

xdk0blc0tqy6a7.life

zootowngravel.com

kreditkarten-optionde.com

6888tlbb.xyz

albertakleekai.com

travelnurseinfofinder3.life

valleyinnswat.com

secure-remove-devices.com

digitalswamy.com

www112casinova.com

medifasttrd.com

distritoxermar.com

Targets

    • Target

      SGLN22060220.xlsx

    • Size

      79KB

    • MD5

      57efdb5c07a2948e09c3535d3b91fc72

    • SHA1

      974c2be9ff6499240c09b570e759e17b83061c68

    • SHA256

      a5985216525198346400da43be15f61b3ef5fcb784d6ebd43ddfc9e269704a68

    • SHA512

      e19b817387f494bea3a879e1d19a63d9a605e8d38f75e0650c64a389f78aca05245a5fdfe28f823b41439be6eabfbffcc7a5adbeeaea26bbd71b78a56135918f

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks