General

  • Target

    9bf581ad524054d013182339682f1ad3

  • Size

    463KB

  • Sample

    221004-x2fbyacac6

  • MD5

    9bf581ad524054d013182339682f1ad3

  • SHA1

    e2034bb82eacd863ae310d493327e1e32321f261

  • SHA256

    45f838f47dc31fd3130e5fc24591a7c59e40bd300a8c093efa8ba503b77d91be

  • SHA512

    c3f7b938ab5f2a3ddfc2266011b183751e039a6995c094d1404c003ff29220b29c3ebf24dd44004438dbb647b679d127b311e9860b6d0a67d7bbe1e459e1ecf4

  • SSDEEP

    12288:MJf8FU3tEBYJJVx7BY18Y8NactaJIwQip+jVdp:MJf8gEyJJVx2+acRR

Malware Config

Extracted

Family

formbook

Campaign

od65

Decoy

oMDl7+9m1JtQ+KJ//bSZYk7C

0nQRVuikEsWM9KcRhRk=

VXATJsbZt/OyEi6Z0Y9m9O4=

C8ZitXuEXIk613jZWQ==

4IIRKYI2mygmEr7EUhOuiEZ1ux4c

x3mNjz4y4M20lnKM1I9m9O4=

UGB//3QuqmDHeDQ=

2H5k5/UwHEwPv2G+Sg==

xHh+uLvyCnZdPo0YXdyEe+ZowQ==

MMGT27gl8VFJ

pLA/Ve3++kcn1lhn6dDmhI2KGzfKNYU=

Ic/vJ/dG0uDhkYblI6XXFL0SN8cDrZP5

MfKDkw/woqFDCabB0YIs

IsDCzc1GuJOGdqX4CgCAPA==

bROVz2hP/wgV9/eGkw4=

cyM+htBboyUeyj0qbuqNTrhX9gJF/6fx

Q+MDF9cCCn8pkyU5y7fmPwYagMMGB7jx

Ve57nDZMRqeXP+V+0IMu

vmJrjeIXWfXWuZbB0YIs

5qVAfUZyi/sC13jZWQ==

Extracted

Family

xloader

Version

3.8

Campaign

od65

Decoy

oMDl7+9m1JtQ+KJ//bSZYk7C

0nQRVuikEsWM9KcRhRk=

VXATJsbZt/OyEi6Z0Y9m9O4=

C8ZitXuEXIk613jZWQ==

4IIRKYI2mygmEr7EUhOuiEZ1ux4c

x3mNjz4y4M20lnKM1I9m9O4=

UGB//3QuqmDHeDQ=

2H5k5/UwHEwPv2G+Sg==

xHh+uLvyCnZdPo0YXdyEe+ZowQ==

MMGT27gl8VFJ

pLA/Ve3++kcn1lhn6dDmhI2KGzfKNYU=

Ic/vJ/dG0uDhkYblI6XXFL0SN8cDrZP5

MfKDkw/woqFDCabB0YIs

IsDCzc1GuJOGdqX4CgCAPA==

bROVz2hP/wgV9/eGkw4=

cyM+htBboyUeyj0qbuqNTrhX9gJF/6fx

Q+MDF9cCCn8pkyU5y7fmPwYagMMGB7jx

Ve57nDZMRqeXP+V+0IMu

vmJrjeIXWfXWuZbB0YIs

5qVAfUZyi/sC13jZWQ==

Targets

    • Target

      6897445707/6897445707.exe

    • Size

      839KB

    • MD5

      381cdc135c6e06969d270fd7e754d148

    • SHA1

      649ee25900a10b1cf567ca867489658be44a3629

    • SHA256

      6c51e2ce3f46927b7b8bc3a559980136e6fdf05bcdf6d84294a0e64fe9adf56b

    • SHA512

      faceefe7b56408c6e187f72871cb55fbf0e4490ce92d886189551facc7292b412dc0d49d7fa67e5e7efc061c39707c9a401b8058253e9b2ca77fa1341ca260b0

    • SSDEEP

      24576:e7eYV4ukDeT876VCMNh39DMPsnjDIP3j:O86kqLnjDIP

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      6897445707/terms_conditions_of_carriage_it.pdf

    • Size

      58KB

    • MD5

      0de95b7f5f0d6af56941b7d2cd1b99bb

    • SHA1

      ba9b92e111599088f10fe235dcb2bdb2cbebc489

    • SHA256

      6d2cab86a9448e3b1e10739cdd8ae8cefd472ae80e21853ffac69b3102ed8412

    • SHA512

      c5ce684289382283cce611ed0e123dbcebe77566605f4557a111f3411c48f6a48dea8f357d2a289c1c800cf4cbd177479ac4fcde53440a0eba94797301d3d6ef

    • SSDEEP

      48:4YnqAc38mjHlkdS6a6vJT/KNlq7Ccxk8lXpouERArgq6C+kot4Ph4EVxcal5Ifwp:4Ync6aOJOLGO8lXNEZtks8h4EVeoAK

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Tasks