General

  • Target

    edilmis faktura.bin.zip

  • Size

    430KB

  • Sample

    230613-jjwpbafd74

  • MD5

    b9630b4a1b9c906fee41b8d27175dcdb

  • SHA1

    f2ff510e5c69e45372030ebb767ff9e376578cf7

  • SHA256

    4cf0ae4fba8592a825b19eac5fa68be43ece8a2603177a006f9927e91898661f

  • SHA512

    29085ba372edb3a9b5be07dce946c089574dd6a8ad25a41d2ee00cfeef57ebce473c0fe6dc17db8b33dc95f24251d8eb2107d59e785cccb979d6bdb28b3484c5

  • SSDEEP

    12288:Xf8s4n8EFCYz1MrQ8K6IRl+GHPHw2EJibLKO:X0s4n8EFJz1V8KZpHP3EJgLKO

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Targets

    • Target

      edilmis faktura.bin

    • Size

      891KB

    • MD5

      9c303dcfbfcc682bff7691077a6d4e33

    • SHA1

      bf14c13c30daaa9662146e177644836ca575df5f

    • SHA256

      914a0ac7bbb378376682002e924a876274aa79ec2aa8d8a2c411b31d0ff48244

    • SHA512

      72d48ad1f9af4fd786147ee3f3c7b6de3873e6e452a082221d4dcc98c7a460f4ca8faa7264948d585e7eececf18412f351465a94eaa3a31c5169c56e628fd8f5

    • SSDEEP

      24576:DqdXPn4tl29UFPWmKoyk4TLmgvky46i95nwka8:DqdfXUFPjKoNw714B

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • ModiLoader Second Stage

    • Xloader payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks