General

  • Target

    Re Payment confirmation against Pro-forma INV# 001PR2022, INV# 003PR2022.exe

  • Size

    1.1MB

  • Sample

    220909-l17t1sghf8

  • MD5

    7af0d42847a6c293a5792bc985991db7

  • SHA1

    25a98dd42fc45f8bf61010ce238465c118911396

  • SHA256

    fabf08da20fd8737e3fa9f8955422c8b12d14ca6d99fd16d13cdf5eedea58c46

  • SHA512

    fc8184c55826f49f3d7f911de7dedd26fed5d150aece302db909b3b49e04f2b5da25433b26fe9ac25439f77466cbeecdaecd10c9646988174cda8e2ac4db8af2

  • SSDEEP

    24576:BkxmXun404azwb4J9Rfv3Fc98ymgiTkpn:Bkxkarzwb853gZm/YJ

Malware Config

Extracted

Family

formbook

Campaign

6hsc

Decoy

6cvqXARAGlgdnnbXYQ==

Mi4yZ8FULou6w26U2FDnEbA=

Xmx0bJmRZGL+O0RFfLFNN9AMdwn+

B0WNhyl4T2gWBIqE1VDnEbA=

DI2G9/sG/v6YIh42aQ==

0NTaAl90ZWYiGV/bT4U=

DWCuXrL23Cc3xdIG/0dT

fTbzys/dddqOVQ==

8ClrDFi3i+asgxBOnguhlQ==

YjOkWLSpXeqrXw==

gAIov8vbtv8vr8/tFSXvDULL7thokKA=

xMW2qsXay7xNkonR/zxPo939

xc38fRlgO2opnnbXYQ==

+o31vQlURJKmLUWfHlMq0Gjs

z6GwWxCSKJLJ

2pnQ5evpehAxUt4hd6pq9X71

2CmXDSU2DTmDR+Q=

WV9ScxFQID1V2glQnguhlQ==

L8UDlK65h9wJ7Zeb3VDnEbA=

Agb4LF2bRcDX

Targets

    • Target

      Re Payment confirmation against Pro-forma INV# 001PR2022, INV# 003PR2022.exe

    • Size

      1.1MB

    • MD5

      7af0d42847a6c293a5792bc985991db7

    • SHA1

      25a98dd42fc45f8bf61010ce238465c118911396

    • SHA256

      fabf08da20fd8737e3fa9f8955422c8b12d14ca6d99fd16d13cdf5eedea58c46

    • SHA512

      fc8184c55826f49f3d7f911de7dedd26fed5d150aece302db909b3b49e04f2b5da25433b26fe9ac25439f77466cbeecdaecd10c9646988174cda8e2ac4db8af2

    • SSDEEP

      24576:BkxmXun404azwb4J9Rfv3Fc98ymgiTkpn:Bkxkarzwb853gZm/YJ

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks