General

  • Target

    Heineken_902738.exe

  • Size

    753KB

  • Sample

    220705-wtgz5abfeq

  • MD5

    7901c752f39af02c460c45bb8c056578

  • SHA1

    c4afb3557c24fe5e8eb4f163ff3d2f8d08a76b24

  • SHA256

    e37b466a994825e7a44f625de253fc03dedd0d042127b035423f5dd2370d2f77

  • SHA512

    61b8f79757a7d6e61e21bc7773c9ae4f2db7fa24175cd5b7d91e3f277bb59d4cff69888ff3c23d801d19cef97b38e7a772c580d8eee832112b8849cfbbdfe85b

Malware Config

Extracted

Family

xloader

Version

2.8

Campaign

nekq

Decoy

/c9oNOPSc9aX85OuoqU=

OJ273U/T/c7no1jC

oPn68XFXJsCG6JOuoqU=

iAUbpb8k0vTRkUTK

pPasgiv9XQi4ESRJKCjRfGdj

J5jO/Yz6+M7no1jC

XdhiI9HBZsZlyKZ1jPx+JvxZEg==

uKpYHaMJ+OCnb0yGJ5d4Fg==

9/aD58LBdIIAdGJIaaiSTSuqn1/A

Q52txESw1ro3n3NlouzWgmgm06DFAvFR

nv0k5OdLOI8bBbwMrO7Lp059Fw==

NJ3N6nHo3qKAhDZJKCjRfGdj

z0FFAyMlzFonbTkMu79n

IxOiRvLolOiHw2lEcphyDfqqn1/A

Pi0Kkdu8Vr84Fg==

hGmJW4f0Eelq7fRazg3f1qZr

+O+SUb0HHflx55l0J5d4Fg==

raG3zxXI4rgz6Ipsia0=

OZuQHihvYzPayG4Ax70=

EYKIJDSGpYffFZOuoqU=

Targets

    • Target

      Heineken_902738.exe

    • Size

      753KB

    • MD5

      7901c752f39af02c460c45bb8c056578

    • SHA1

      c4afb3557c24fe5e8eb4f163ff3d2f8d08a76b24

    • SHA256

      e37b466a994825e7a44f625de253fc03dedd0d042127b035423f5dd2370d2f77

    • SHA512

      61b8f79757a7d6e61e21bc7773c9ae4f2db7fa24175cd5b7d91e3f277bb59d4cff69888ff3c23d801d19cef97b38e7a772c580d8eee832112b8849cfbbdfe85b

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Xloader Payload

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks