General

  • Target

    Scan SOA.exe

  • Size

    500KB

  • Sample

    220706-y29q8aahg6

  • MD5

    e69167de6d19a41819f25de01cd10aef

  • SHA1

    c302c06e1cb00e72013b0671ba0db1a541673289

  • SHA256

    4863509ff407e4a6389305b5555bc804aa5df9b67290feeb1e36bf68f40696e1

  • SHA512

    73ec2711e5c3076fee07a03db0289887946a66d3f6656ece5a12db6ad672424368a6e9b5feb339b97a8cec63bf3869b8062f90335fb58e99a9894ef0afa742e1

Malware Config

Extracted

Family

xloader

Version

2.8

Campaign

nmd2

Decoy

FNWENUOMqqSv0Q==

ls6DEbQ1KBCeSsvUyRg=

mwgrjwpFplaykGoT

Uzzj8yXi13iLMnNGZcnViQliwA==

T7vzj0l0lqquyA==

csHzBjwvF7rmjcmWxjThd61NuuVl4gQ=

YaXyTwg3p1vrf/n9kYJQjrc=

cHAfFEI1JKDF4mTsGjDbeg==

TdDv+o9VSFep3wgTtY0swqQ=

Jw66vdyXdRZG9jJZycLD

icGvsuKZgXNid1M=

6m6H0GvguY+vZZpcioudbQ==

kNUBYMuymhgm2b0q3bEAiQliwA==

M3SiAXRbVe0XAsxDOIp6cg==

+eWLk+HjRRe3LuyavQ==

753R3QYD8XOWtWI0ouGpYw==

dRg+bQZ6TSbC8Sbs2mXXxLM=

kDlUsE+U7Y/RfUQ=

oENlcFZVqqSv0Q==

HCC+nbachxEs1f29GjDbeg==

Targets

    • Target

      Scan SOA.exe

    • Size

      500KB

    • MD5

      e69167de6d19a41819f25de01cd10aef

    • SHA1

      c302c06e1cb00e72013b0671ba0db1a541673289

    • SHA256

      4863509ff407e4a6389305b5555bc804aa5df9b67290feeb1e36bf68f40696e1

    • SHA512

      73ec2711e5c3076fee07a03db0289887946a66d3f6656ece5a12db6ad672424368a6e9b5feb339b97a8cec63bf3869b8062f90335fb58e99a9894ef0afa742e1

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Xloader Payload

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks