General

  • Target

    3093827637263.exe

  • Size

    1.0MB

  • Sample

    230615-r6kvbsaa35

  • MD5

    749ce2276567faddc7fdb2bc59c13a6c

  • SHA1

    8a45a6ee8553f4f55ec0fb416d62e6436507d8f9

  • SHA256

    9932a48daf4df5a5f07836851c8b594bb54ede58c85fdb22f3198acd61da701e

  • SHA512

    324243d0104f4e0a7edecdb0fcebb93809b3fc6cb140b18c2c1f8406f1b697bb0c17785bc768f27b6b86bf18a9e168aa2951bc3ec3df3d5cc36fccc6c09c026d

  • SSDEEP

    24576:Zs/dShaR6+yPvvIYHGrw8R+d7BOQ6nWz0:Zs/uC4JHGU0gBOQ6Wz0

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Targets

    • Target

      3093827637263.exe

    • Size

      1.0MB

    • MD5

      749ce2276567faddc7fdb2bc59c13a6c

    • SHA1

      8a45a6ee8553f4f55ec0fb416d62e6436507d8f9

    • SHA256

      9932a48daf4df5a5f07836851c8b594bb54ede58c85fdb22f3198acd61da701e

    • SHA512

      324243d0104f4e0a7edecdb0fcebb93809b3fc6cb140b18c2c1f8406f1b697bb0c17785bc768f27b6b86bf18a9e168aa2951bc3ec3df3d5cc36fccc6c09c026d

    • SSDEEP

      24576:Zs/dShaR6+yPvvIYHGrw8R+d7BOQ6nWz0:Zs/uC4JHGU0gBOQ6Wz0

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • ModiLoader Second Stage

    • Xloader payload

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks