General

  • Target

    PO 24000109490.xlsx

  • Size

    2.0MB

  • Sample

    210111-7e9mxpnmma

  • MD5

    6379ce1baf8d921aaae608b2dd8906c6

  • SHA1

    ce09f77a95714d7a44f2ad55c64a7c60ac2ada3a

  • SHA256

    25aa6bd2dcdf1aa19a84a16daf35ddecf15f62cbfb76a4e6d06735abed15dd7d

  • SHA512

    efc3710a2fec71e1b553233585fa266b952aab1d83f12c681b05bff4b9f744f5ae58ee15b1ac97abdb849da823e155c611e14ee98888928cb3c361c1f65a9662

Malware Config

Extracted

Family

formbook

C2

http://www.bodyfuelrtd.com/8rg4/

Decoy

fakecostasunglasses.com

twinbrothers.pizza

jizhoujsp.com

qscrit.com

hotelmanise.com

fer-ua.online

europserver-simcloud.systems

redwap2.pro

betwalkoffame.com

latashalovemillionaire.com

8million-lr.com

tomatrader.com

modaluxcutabovefitness.com

shishijiazu.com

cckytx.com

reversehomeloansmiami.com

imaginenationnetwork.com

thecyclistshop.com

jorgegiljewelry.com

hlaprotiens.com

Targets

    • Target

      PO 24000109490.xlsx

    • Size

      2.0MB

    • MD5

      6379ce1baf8d921aaae608b2dd8906c6

    • SHA1

      ce09f77a95714d7a44f2ad55c64a7c60ac2ada3a

    • SHA256

      25aa6bd2dcdf1aa19a84a16daf35ddecf15f62cbfb76a4e6d06735abed15dd7d

    • SHA512

      efc3710a2fec71e1b553233585fa266b952aab1d83f12c681b05bff4b9f744f5ae58ee15b1ac97abdb849da823e155c611e14ee98888928cb3c361c1f65a9662

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks