General

  • Target

    de2bd88b2005f35b987819e8431c3e01

  • Size

    1.2MB

  • Sample

    220920-t1x9kshcdn

  • MD5

    de2bd88b2005f35b987819e8431c3e01

  • SHA1

    ce93b62f644972efabe0e6494a35c1e2f0f86a7e

  • SHA256

    99f5d4bcd2ae5e78aedf605d22c1ed6b869493c589c438326a41883d4f68cc5e

  • SHA512

    ad840df5730b06f73084564d975ce99d382dd14fde10bbb910eb9cfe4b9b97c6616e2143fc6293a0b8a0ff6c0d6485ef0cd310602a1191a40ed7d88eecd6246f

  • SSDEEP

    12288:BKYT2/Y/7Ua1oog3tum1xwbLtr37azyJ5vBIco/s4+Nk7SL+TK8zFo89SaDoii6W:PTANa1HMumHaBtLvn4+D9802oi5T6F

Malware Config

Extracted

Family

formbook

Campaign

6hsc

Decoy

6cvqXARAGlgdnnbXYQ==

Mi4yZ8FULou6w26U2FDnEbA=

Xmx0bJmRZGL+O0RFfLFNN9AMdwn+

B0WNhyl4T2gWBIqE1VDnEbA=

DI2G9/sG/v6YIh42aQ==

0NTaAl90ZWYiGV/bT4U=

DWCuXrL23Cc3xdIG/0dT

fTbzys/dddqOVQ==

8ClrDFi3i+asgxBOnguhlQ==

YjOkWLSpXeqrXw==

gAIov8vbtv8vr8/tFSXvDULL7thokKA=

xMW2qsXay7xNkonR/zxPo939

xc38fRlgO2opnnbXYQ==

+o31vQlURJKmLUWfHlMq0Gjs

z6GwWxCSKJLJ

2pnQ5evpehAxUt4hd6pq9X71

2CmXDSU2DTmDR+Q=

WV9ScxFQID1V2glQnguhlQ==

L8UDlK65h9wJ7Zeb3VDnEbA=

Agb4LF2bRcDX

Targets

    • Target

      Invoice MI083761.exe

    • Size

      836KB

    • MD5

      92ea516a4e27329ac0ef278dab2bfa76

    • SHA1

      46e5db00e3f9a674208a51590aad707c2ffc03f8

    • SHA256

      5dd3a0a56d55816a0ffa7a9f2feb75613a68bd2ba9f145bd69ea616e8b8c9c9e

    • SHA512

      4ba4497ae441ff8879a6acaaef259915ead6021a058646c2726e77a87599b78d6dcc73879491f11b99d958388bcfff4b5c9f9eb9423bcda92a5c53df3a9789ba

    • SSDEEP

      12288:aBoolbR462TDeI3BqjN23YNzH44kCYtAbmT:ae603g032U4kPtQmT

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks