General

  • Target

    _MVOCEANGLORY_Inquiry.xlsx

  • Size

    1.7MB

  • Sample

    210118-bfmwh5jkrj

  • MD5

    92484ad004022b18f529dc8420117aee

  • SHA1

    2b614a1f275f6fff2fa6ff2362e343a8f7af3b07

  • SHA256

    8a59252c90714f9b4221ca33dfe39baa66254a69f7d074aae1994f58c55da736

  • SHA512

    7703a2d1bc91178a45bad9a3fe4e4ac9fb14fb8b8f3e7fa2b448ac8e3b428000b29b220a85f567e53a1d0173e7cf1f658381b5be7ce19d47599d9fce54622d1b

Malware Config

Extracted

Family

formbook

C2

http://www.kaiyuansu.pro/incn/

Decoy

1bovvfk93jd.com

enlightenedhealthcoaching.com

findthatsmartphone.com

intelligentsystemsus.com

xn--lmsealamientos-tnb.com

eot0luh5ia.men

babanewshop.com

beyond-bit.com

meritane.com

buythinsecret.com

c2ornot.com

twelvesband.com

rktlends.com

bourseandish.com

happyshop88.com

topangacanyonvintage.com

epersonalloansonline.com

roofers-anaheim.com

shanghaiys.net

bickel.wtf

Targets

    • Target

      _MVOCEANGLORY_Inquiry.xlsx

    • Size

      1.7MB

    • MD5

      92484ad004022b18f529dc8420117aee

    • SHA1

      2b614a1f275f6fff2fa6ff2362e343a8f7af3b07

    • SHA256

      8a59252c90714f9b4221ca33dfe39baa66254a69f7d074aae1994f58c55da736

    • SHA512

      7703a2d1bc91178a45bad9a3fe4e4ac9fb14fb8b8f3e7fa2b448ac8e3b428000b29b220a85f567e53a1d0173e7cf1f658381b5be7ce19d47599d9fce54622d1b

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks