General

  • Target

    new order.xlsx

  • Size

    1.4MB

  • Sample

    210114-g7frk6x4jx

  • MD5

    6f72ba8da386566b04b4101c84087037

  • SHA1

    8609e0eab98f629be62c8467cf89cb07e3273639

  • SHA256

    cc37109e31ff6ed6792d0f9201d3a5169a51dabae5d40806195344a8f3c8ac1f

  • SHA512

    8bbf675fc7cda860305c1bf491fcc2a8f456653b4bdc9d06961d1a7b5dbd429674b31715b0ebc4e03c3244587b406cc2504e024312b7b8c70470a26b41508e4d

Malware Config

Extracted

Family

formbook

C2

http://www.h-v-biz.com/c8so/

Decoy

floeperformancegear.com

youtubeincreaser.com

cbb-is.com

bullsbikeusa.com

mama-asobitai.com

parkdaleliving.com

kinneintl.com

byrondramos.com

topangashaman.com

channel1057.com

nuancedigitalsolutions.com

kumheekim.com

erikating.com

ulinekorea.com

giftoes.com

blacknation.info

eventsdonevirtually.com

mx190501.com

bingent.info

seronofertilitymeds.com

Targets

    • Target

      new order.xlsx

    • Size

      1.4MB

    • MD5

      6f72ba8da386566b04b4101c84087037

    • SHA1

      8609e0eab98f629be62c8467cf89cb07e3273639

    • SHA256

      cc37109e31ff6ed6792d0f9201d3a5169a51dabae5d40806195344a8f3c8ac1f

    • SHA512

      8bbf675fc7cda860305c1bf491fcc2a8f456653b4bdc9d06961d1a7b5dbd429674b31715b0ebc4e03c3244587b406cc2504e024312b7b8c70470a26b41508e4d

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks