General

  • Target

    Purchase order.xlsx

  • Size

    176KB

  • Sample

    220707-ggvywsgcc4

  • MD5

    64149c6e22404ef9a319a2db97fb378e

  • SHA1

    62ba4c9e779725fde57e30c5420302647b98b76c

  • SHA256

    65422e9c3dbf3159e51d223541718875840dc1b473ff124f09c5e52f96329b6b

  • SHA512

    14c9162e34d67f347c63c01b3a0ef21f42bd1bcf33d3b0f1523c500ef50e824369d180259c90b74b829f9c1f04591821146812f281870e48830bdeb0b61259b7

Malware Config

Targets

    • Target

      Purchase order.xlsx

    • Size

      176KB

    • MD5

      64149c6e22404ef9a319a2db97fb378e

    • SHA1

      62ba4c9e779725fde57e30c5420302647b98b76c

    • SHA256

      65422e9c3dbf3159e51d223541718875840dc1b473ff124f09c5e52f96329b6b

    • SHA512

      14c9162e34d67f347c63c01b3a0ef21f42bd1bcf33d3b0f1523c500ef50e824369d180259c90b74b829f9c1f04591821146812f281870e48830bdeb0b61259b7

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE MSIL/GenKryptik.FQRH Download Request

      suricata: ET MALWARE MSIL/GenKryptik.FQRH Download Request

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Xloader Payload

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks