General

  • Target

    order no. 43453.exe

  • Size

    888KB

  • Sample

    210112-nmz3zpm76j

  • MD5

    6ec0ad707cfd679db91e380648658a1c

  • SHA1

    6522654f789b6da6045c244187c776401ae61b35

  • SHA256

    b9e89d7766f894c102cd449dace5e9c1ef8f3cdca070af5f6ce22a7737eb593a

  • SHA512

    0255a358f7307400f4511d0cf6ef848291bdce447a2aff3dae239664cc80b4c3c74ccf674a0da0f7c64ef395181da07e46ed0b146574d5c9232e4c8e36c6aeb7

Malware Config

Extracted

Family

formbook

C2

http://www.valiantbranch.com/0wdn/

Decoy

inclusivefamilybookshop.com

hollyjmillsphotography.com

mojavewellnessaz.com

cookies-x.info

trainingkanban.com

tempoborough.life

mayalv.com

mbsgiftstore.com

vanjele.com

serieshaha.com

jlbstructural.com

topkids.asia

thejoyofleather.com

qvujxa.com

anythinginworld.com

danielablason.com

smartphoneloops.com

thisisauckland.com

cityelectricals.com

revati-thenoir.com

Targets

    • Target

      order no. 43453.exe

    • Size

      888KB

    • MD5

      6ec0ad707cfd679db91e380648658a1c

    • SHA1

      6522654f789b6da6045c244187c776401ae61b35

    • SHA256

      b9e89d7766f894c102cd449dace5e9c1ef8f3cdca070af5f6ce22a7737eb593a

    • SHA512

      0255a358f7307400f4511d0cf6ef848291bdce447a2aff3dae239664cc80b4c3c74ccf674a0da0f7c64ef395181da07e46ed0b146574d5c9232e4c8e36c6aeb7

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks