General

  • Target

    invoice.xlsx

  • Size

    1.4MB

  • Sample

    210113-z9yvpqedyx

  • MD5

    f797660bb4a8d43cf75e570e59ffd6a1

  • SHA1

    830d68b065521d15f014677aa80acc4fc4098360

  • SHA256

    8c4ecf908b97c808d8cc843ecd6c32928d3402b348b897b46629c2a96351ac39

  • SHA512

    c7fdd95ec3e672ecd312d63f75876c6142676a054c594d0dcddb0c1b56c677f9f10338133ef8e38a38ea64bca2c51aa812080e2be0c70070fdb6efb0f3d794b9

Malware Config

Extracted

Family

formbook

C2

http://www.h-v-biz.com/c8so/

Decoy

floeperformancegear.com

youtubeincreaser.com

cbb-is.com

bullsbikeusa.com

mama-asobitai.com

parkdaleliving.com

kinneintl.com

byrondramos.com

topangashaman.com

channel1057.com

nuancedigitalsolutions.com

kumheekim.com

erikating.com

ulinekorea.com

giftoes.com

blacknation.info

eventsdonevirtually.com

mx190501.com

bingent.info

seronofertilitymeds.com

Targets

    • Target

      invoice.xlsx

    • Size

      1.4MB

    • MD5

      f797660bb4a8d43cf75e570e59ffd6a1

    • SHA1

      830d68b065521d15f014677aa80acc4fc4098360

    • SHA256

      8c4ecf908b97c808d8cc843ecd6c32928d3402b348b897b46629c2a96351ac39

    • SHA512

      c7fdd95ec3e672ecd312d63f75876c6142676a054c594d0dcddb0c1b56c677f9f10338133ef8e38a38ea64bca2c51aa812080e2be0c70070fdb6efb0f3d794b9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks