General

  • Target

    BSL 01321 PYT.xlsx

  • Size

    1.2MB

  • Sample

    210113-sxjb87qtbs

  • MD5

    d3d8e84318aa37f8ddfb091d1f6fd3a1

  • SHA1

    813965f6dd16278e8ab4b86ff3389bb06c8bbfc8

  • SHA256

    e7657932eab205aa1e946f41120b31ef481b7ed87c225b215104c22f69a97841

  • SHA512

    0a8102559b28bf6e92092b4f73579da19794ab8de97694506feb7e5d43349f379b3af05aeec8518b9217fa52f316599459114497c4af8f4f19aded5386428cce

Malware Config

Extracted

Family

formbook

C2

http://www.stonescapes1.com/de92/

Decoy

zindaginews.com

tyelevator.com

schustermaninterests.com

algemixdelchef.com

doubscollectivites.com

e-butchery.com

hellbentmask.com

jumbpprivacy.com

teeniestiedye.com

playfulartwork.com

desertvacahs.com

w5470-hed.net

nepalearningpods.com

smoothandsleek.com

thecannaglow.com

torrentkittyla.com

industrytoyou.com

raquelvargas.net

rlc-nc.net

cryptoprises.com

Targets

    • Target

      BSL 01321 PYT.xlsx

    • Size

      1.2MB

    • MD5

      d3d8e84318aa37f8ddfb091d1f6fd3a1

    • SHA1

      813965f6dd16278e8ab4b86ff3389bb06c8bbfc8

    • SHA256

      e7657932eab205aa1e946f41120b31ef481b7ed87c225b215104c22f69a97841

    • SHA512

      0a8102559b28bf6e92092b4f73579da19794ab8de97694506feb7e5d43349f379b3af05aeec8518b9217fa52f316599459114497c4af8f4f19aded5386428cce

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks