General

  • Target

    Bestellbeleg _ TCW23955 _.exe

  • Size

    481KB

  • Sample

    221005-hnl51adeg5

  • MD5

    244e25f9594a67310c1e343439dc1a22

  • SHA1

    9f358e6c79734d1624f5e282c527f88676d00436

  • SHA256

    2bc804ba23087af0322ad6db39591dfa67663374579f40fb9b44321144beb9ce

  • SHA512

    71650005d885af672f128b23718619633630da8f453fc0b6bbbd94ffb92679296b98eafa11f4b1eea61c94e32aff91ffad05c5d3ce4db87925858df1cf6b2225

  • SSDEEP

    12288:uToPWBv/cpGrU3ywtmTcatB3WxS9YYNNDsePPc:uTbBv5rU9mT3fieK

Malware Config

Extracted

Family

formbook

Campaign

nrln

Decoy

IG7zJSm49UqTTuu/N/oTCIg=

CVLdAPgw0CRSMuZnRRU=

PiA5Z3umP2NyX81VGQhjWyS59nFYhXiG

5i6p4GeQqtBgNRfGNQ==

5984keYswxh8mGZHz4ipAHtQ

VNJaK4Gh0CrOvHpW/p353A==

71rEtrL2icToyKGhcWrTxjsFU5T98zeO

r3q1sy1iZaL+2XIUAob7yw==

9+83Qkrk/vV/jVXsDvoTCIg=

aMFAgYF1prov8/UErH/Y1A==

Alqtx/0rxwEbCLdudftl

ImCbnglBSUHF0mv2tTSP40bPeYao

s4DFNvAJ4GIJ+g==

phOa6mtS8QQICuZnRRU=

7TSu5vqRtB45EZtf4WDSTBHPeYao

ImPWqwUUIVWMQLyMbUab7tmspvNCcT8=

HF7jKjbGox2SAffTPw==

yAM3mOQot5l+cD0ikR5MGp8=

UYzW0/8z70JcQenVLidu1kLPeYao

OoCznp5UWz+hT9OBFXbfVhXPeYao

Extracted

Family

xloader

Version

3.8

Campaign

nrln

Decoy

IG7zJSm49UqTTuu/N/oTCIg=

CVLdAPgw0CRSMuZnRRU=

PiA5Z3umP2NyX81VGQhjWyS59nFYhXiG

5i6p4GeQqtBgNRfGNQ==

5984keYswxh8mGZHz4ipAHtQ

VNJaK4Gh0CrOvHpW/p353A==

71rEtrL2icToyKGhcWrTxjsFU5T98zeO

r3q1sy1iZaL+2XIUAob7yw==

9+83Qkrk/vV/jVXsDvoTCIg=

aMFAgYF1prov8/UErH/Y1A==

Alqtx/0rxwEbCLdudftl

ImCbnglBSUHF0mv2tTSP40bPeYao

s4DFNvAJ4GIJ+g==

phOa6mtS8QQICuZnRRU=

7TSu5vqRtB45EZtf4WDSTBHPeYao

ImPWqwUUIVWMQLyMbUab7tmspvNCcT8=

HF7jKjbGox2SAffTPw==

yAM3mOQot5l+cD0ikR5MGp8=

UYzW0/8z70JcQenVLidu1kLPeYao

OoCznp5UWz+hT9OBFXbfVhXPeYao

Targets

    • Target

      Bestellbeleg _ TCW23955 _.exe

    • Size

      481KB

    • MD5

      244e25f9594a67310c1e343439dc1a22

    • SHA1

      9f358e6c79734d1624f5e282c527f88676d00436

    • SHA256

      2bc804ba23087af0322ad6db39591dfa67663374579f40fb9b44321144beb9ce

    • SHA512

      71650005d885af672f128b23718619633630da8f453fc0b6bbbd94ffb92679296b98eafa11f4b1eea61c94e32aff91ffad05c5d3ce4db87925858df1cf6b2225

    • SSDEEP

      12288:uToPWBv/cpGrU3ywtmTcatB3WxS9YYNNDsePPc:uTbBv5rU9mT3fieK

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks