General

  • Target

    SOA.exe

  • Size

    952KB

  • Sample

    220707-kjwjzsbcg5

  • MD5

    d214a74543e7e29a6702358a3a834f70

  • SHA1

    7fd6aa9cf895309fca426c6decff54e17f979a8c

  • SHA256

    535fb5862370192d9fa74321ef99aa8fe36aaf56689f48411fc7c14b9c984533

  • SHA512

    b4e5fad9f7ecf61c29d2c7f960f6dcb6d8977720eebb61014aff45c71d95112525a55ee84cde93ab7bbd689a00f4a2f21d3f2306e97a7e836c69cf14c2512fc7

Malware Config

Extracted

Family

xloader

Version

2.8

Campaign

nmd2

Decoy

FNWENUOMqqSv0Q==

ls6DEbQ1KBCeSsvUyRg=

mwgrjwpFplaykGoT

Uzzj8yXi13iLMnNGZcnViQliwA==

T7vzj0l0lqquyA==

csHzBjwvF7rmjcmWxjThd61NuuVl4gQ=

YaXyTwg3p1vrf/n9kYJQjrc=

cHAfFEI1JKDF4mTsGjDbeg==

TdDv+o9VSFep3wgTtY0swqQ=

Jw66vdyXdRZG9jJZycLD

icGvsuKZgXNid1M=

6m6H0GvguY+vZZpcioudbQ==

kNUBYMuymhgm2b0q3bEAiQliwA==

M3SiAXRbVe0XAsxDOIp6cg==

+eWLk+HjRRe3LuyavQ==

753R3QYD8XOWtWI0ouGpYw==

dRg+bQZ6TSbC8Sbs2mXXxLM=

kDlUsE+U7Y/RfUQ=

oENlcFZVqqSv0Q==

HCC+nbachxEs1f29GjDbeg==

Targets

    • Target

      SOA.exe

    • Size

      952KB

    • MD5

      d214a74543e7e29a6702358a3a834f70

    • SHA1

      7fd6aa9cf895309fca426c6decff54e17f979a8c

    • SHA256

      535fb5862370192d9fa74321ef99aa8fe36aaf56689f48411fc7c14b9c984533

    • SHA512

      b4e5fad9f7ecf61c29d2c7f960f6dcb6d8977720eebb61014aff45c71d95112525a55ee84cde93ab7bbd689a00f4a2f21d3f2306e97a7e836c69cf14c2512fc7

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks