General

  • Target

    17a8ec56dafaad109906330a0ccef3dbb3592fbf21c33cc26255a154fe3976f7.xls

  • Size

    813KB

  • Sample

    221203-fh11vsfd57

  • MD5

    b5c98554695c6d71e28bf2ed1a10098a

  • SHA1

    40d789b940747f88f40cdd0cbc891486cd0868ec

  • SHA256

    17a8ec56dafaad109906330a0ccef3dbb3592fbf21c33cc26255a154fe3976f7

  • SHA512

    3817d96e370d28d92d2ba05ab50cfed03c8afbb357c670964c190273e1f3fe09aac053ff1913ec8f51fe868e153f9b53ed471c74200b0d7a6ef83da6a7d1947e

  • SSDEEP

    24576:bL8r5XXXXXXXXXXXXUXXXXXXXSXXXXXXXX9mZr5XXXXXXXXXXXXUXXXXXXXSXXXr:DSW

Malware Config

Extracted

Family

formbook

Campaign

pgnt

Decoy

0WG18LbM4lR9iqMRa4nlBzTb

jcfGYzPgZTqFZVO9FV2yIw==

laIfrdSC8/4CNg==

Q73ilev5GIWuOrAAFV2yIw==

Q2u/pMw7pv4sPA==

TbqvIUHwlQscPo0HFV2yIw==

8PNWfGPyE8n0IQ==

WtgROxXzvY2L

PryaRBNjm4eP

Y9Hdi06Cry1um9Sj68YAu1o=

3Gulyp7CMQtR78jvLkk=

JJ3GasTVTCRQT6Tfz6S6GlI=

RnS42bhb9tI0R6UpD6wOxriNxw==

he1mi2sOGfzTRGHnuA==

eaYjCtjxVjdU5XLRtBMBLKk9quA=

k9rTeEqYzzw8WaTfz6S6GlI=

5luVQwe2vJWKEAiMdF4=

MGW14L9OVk5Y5TaR6w/DqdhYxXVY

mAsYz6k6sQkDC0/DoHj9t1RPWLSgFQ==

y5klhuMbE8n0IQ==

Extracted

Family

xloader

Version

3.�E

Campaign

pgnt

Decoy

0WG18LbM4lR9iqMRa4nlBzTb

jcfGYzPgZTqFZVO9FV2yIw==

laIfrdSC8/4CNg==

Q73ilev5GIWuOrAAFV2yIw==

Q2u/pMw7pv4sPA==

TbqvIUHwlQscPo0HFV2yIw==

8PNWfGPyE8n0IQ==

WtgROxXzvY2L

PryaRBNjm4eP

Y9Hdi06Cry1um9Sj68YAu1o=

3Gulyp7CMQtR78jvLkk=

JJ3GasTVTCRQT6Tfz6S6GlI=

RnS42bhb9tI0R6UpD6wOxriNxw==

he1mi2sOGfzTRGHnuA==

eaYjCtjxVjdU5XLRtBMBLKk9quA=

k9rTeEqYzzw8WaTfz6S6GlI=

5luVQwe2vJWKEAiMdF4=

MGW14L9OVk5Y5TaR6w/DqdhYxXVY

mAsYz6k6sQkDC0/DoHj9t1RPWLSgFQ==

y5klhuMbE8n0IQ==

Targets

    • Target

      17a8ec56dafaad109906330a0ccef3dbb3592fbf21c33cc26255a154fe3976f7.xls

    • Size

      813KB

    • MD5

      b5c98554695c6d71e28bf2ed1a10098a

    • SHA1

      40d789b940747f88f40cdd0cbc891486cd0868ec

    • SHA256

      17a8ec56dafaad109906330a0ccef3dbb3592fbf21c33cc26255a154fe3976f7

    • SHA512

      3817d96e370d28d92d2ba05ab50cfed03c8afbb357c670964c190273e1f3fe09aac053ff1913ec8f51fe868e153f9b53ed471c74200b0d7a6ef83da6a7d1947e

    • SSDEEP

      24576:bL8r5XXXXXXXXXXXXUXXXXXXXSXXXXXXXX9mZr5XXXXXXXXXXXXUXXXXXXXSXXXr:DSW

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks