General

  • Target

    Invoice B9800177.exe

  • Size

    628KB

  • Sample

    220706-jqy31sadbl

  • MD5

    36efa9e34b8055b9e54572997f85099a

  • SHA1

    ceeb08b5411a56c0fc98388bc427b9aa563d8967

  • SHA256

    b87ec1a86d0c11e1183ec3de93241427e393f0016ff662fe6c9d98af2faf22d5

  • SHA512

    e4bbdaad01e7da77457af0420e9f777f59ec08cebc728b6396696317c69329d6c5a385b584abd642f92138324838e9df347b8f61f346aad9583eac115f1a2413

Malware Config

Targets

    • Target

      Invoice B9800177.exe

    • Size

      628KB

    • MD5

      36efa9e34b8055b9e54572997f85099a

    • SHA1

      ceeb08b5411a56c0fc98388bc427b9aa563d8967

    • SHA256

      b87ec1a86d0c11e1183ec3de93241427e393f0016ff662fe6c9d98af2faf22d5

    • SHA512

      e4bbdaad01e7da77457af0420e9f777f59ec08cebc728b6396696317c69329d6c5a385b584abd642f92138324838e9df347b8f61f346aad9583eac115f1a2413

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Xloader Payload

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks