General

  • Target

    shipping docs.exe

  • Size

    850KB

  • Sample

    220627-mnsp1aaecj

  • MD5

    e1666ef4566ba59ac9cb52fce5bf3438

  • SHA1

    4bd7d742bb83a86046422029b1fce728650be25d

  • SHA256

    892386e40db2d9d22e9fe3ddd47f369e6f68757c68aa98ada9c74a346046eac9

  • SHA512

    c58018a859f0370503c672754893bf272511cafbeb9c1d0894ba7a19055d207ec8e83b57abeac6e578d0deb0db7aa9f49d24115793d60bc263abd91a6cc1fe8c

Malware Config

Extracted

Family

xloader

Version

2.9

Campaign

gfv7

Decoy

hd4AZDZ3XeSkZ9w0NRn2+JU=

6iAxmGKdumxFEgwp

jM6QcxNUSeCKaUdvvh3g9mffhosQ

d4CC0LS0DjTJS8FdXqd3soM=

S1LPlXEIJY52Og==

doeO7AimsF0NEvFgnIV5

W2TlzH/byHtUU3B7tw==

Y2RAbyZjex2qj6GQv4Q=

ftoOsCpZdfmALQ==

4kqL8v/6rDj8Ohs/wAjkb0gD5Gfiww==

8mVs/AkvwLnIWp4=

yfqAazgHioT8b9yHSKpLDtgY

EyWD5F+Wu3L0xq/VJXgdlnFvBDdUz5WM

jn9ty+pdRNdtcDhJ5k8nwZofm4EJ

s9XVNv4/aRDBUx4w

+vHFE7Fw1rnIWp4=

wC395Yvi6G/3yoWRGW1USxzshi3Dyw==

jcbufIN91gHAUK1RYUMYIdyqpDlUz5WM

iIyoIvZNXwPNmBlBxGk6+A==

C/hTD8h/KWLiMW4Mt/joXyz23Q==

Targets

    • Target

      shipping docs.exe

    • Size

      850KB

    • MD5

      e1666ef4566ba59ac9cb52fce5bf3438

    • SHA1

      4bd7d742bb83a86046422029b1fce728650be25d

    • SHA256

      892386e40db2d9d22e9fe3ddd47f369e6f68757c68aa98ada9c74a346046eac9

    • SHA512

      c58018a859f0370503c672754893bf272511cafbeb9c1d0894ba7a19055d207ec8e83b57abeac6e578d0deb0db7aa9f49d24115793d60bc263abd91a6cc1fe8c

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Xloader Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks