General

  • Target

    Pre-order.xlsx

  • Size

    2.2MB

  • Sample

    210119-a2zqs8nyze

  • MD5

    ff38cf4d7025c0a5be3d81ac520c498b

  • SHA1

    2ad3bf55a7ac4c636ecdf1b703d46afd190b9525

  • SHA256

    cadb48c6d6cb9a5806bb74899c4837916538e2b9257dcc0f28640cc8179fd391

  • SHA512

    039351f7634ef17c18047c4f1e4fa2be2e71660f814019c014e69900f3a4fcc4c9153a1656d4e1ae15ad5203a2db5a2679922fe6716a1ccfef316b1a7217a0f9

Malware Config

Extracted

Family

formbook

C2

http://www.douzhuan168.com/o8na/

Decoy

www1669099.com

digitalallserv.com

thiszzzwq.info

dallasoswalt.info

ladolcefesta.com

mariamalikially.com

origenbsas.com

antichoc.watch

tropicalbirdtoys.com

bbluedotvrwdbuy.com

racevx.xyz

ut-trustandwill.com

maximumhomeoffers.com

wrapname.com

hypelighystrip.com

oshoum2020.com

parkwestmi.com

themodumall.com

tempuslawnandsnow.com

dailypromo.xyz

Targets

    • Target

      Pre-order.xlsx

    • Size

      2.2MB

    • MD5

      ff38cf4d7025c0a5be3d81ac520c498b

    • SHA1

      2ad3bf55a7ac4c636ecdf1b703d46afd190b9525

    • SHA256

      cadb48c6d6cb9a5806bb74899c4837916538e2b9257dcc0f28640cc8179fd391

    • SHA512

      039351f7634ef17c18047c4f1e4fa2be2e71660f814019c014e69900f3a4fcc4c9153a1656d4e1ae15ad5203a2db5a2679922fe6716a1ccfef316b1a7217a0f9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks