General

  • Target

    49985cf212ea355f93e38481c8376734.bin

  • Size

    393KB

  • Sample

    230723-btvwrsch63

  • MD5

    127e473885759459143ff3d31bc347f3

  • SHA1

    8617452eb07b1bb44864284b3e913ddcba540dfd

  • SHA256

    0f1834fd9ddda99d631bb06ffb5b92a577ec6734c5339301b95ee27be99069ed

  • SHA512

    49792f88686957fb25e55389aca54181a3c05f7b09194bf1b95937075dc2cbcfdbcddb53eea4ca16b495f56f2f526ded17bbbac44d762e57c2579b525b9b3dc9

  • SSDEEP

    12288:kWHJKVNn6qHS8k4cnev9jBKYh/sWuWUmV:1HENn6q9+nysiUK

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Targets

    • Target

      b25eec1ba4f98d59e8fbb6d5ee791f86ad2ec3882f49a9df12794d1b519fdc14.exe

    • Size

      790KB

    • MD5

      49985cf212ea355f93e38481c8376734

    • SHA1

      9f1e5fe65d87e70f1a2f46928728f097e15f7517

    • SHA256

      b25eec1ba4f98d59e8fbb6d5ee791f86ad2ec3882f49a9df12794d1b519fdc14

    • SHA512

      67d5d117834d0d611b8c574aecc972cdb8fc99d43a3926947320a56181bf0c1943057a8068d9aa2bc5050d808f67fb49c06b5e1bb25c65696662ef0a701405a6

    • SSDEEP

      24576:rk/A25GoqxIJs7ks3XJrPz6cDCnvM3qv9:rKAKGj7ks35rPmaCnvM6v9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Suspicious use of NtCreateProcessOtherParentProcess

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • ModiLoader Second Stage

    • Xloader payload

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks