General

  • Target

    Jyoti CNC Automation Ltd.exe

  • Size

    386KB

  • Sample

    221205-j4exasfa6v

  • MD5

    76546253ae7de8218aaea566454db844

  • SHA1

    fdeef99c922f422a1d49e7d692391a1afa1ac521

  • SHA256

    dd6ef39d8ed08e7355551c7140b5094d57f5c1bf70549f686ca18b9b1698e468

  • SHA512

    2d261ae2988644b7f0d033dda3aa0309f9f895d50d1539053b20702cf43adc6a1c5484bcf0b3b8ab6ffc7cd16d207c9b3ee518506783da525f2f91814942d1eb

  • SSDEEP

    6144:hBn7A5jMUCoQxOXdAwD6D7OUg00HsWFyChk1ucywA+EpxWGFjSHl:vrsXd1O3OUfDWFyChk+wA+ER2F

Malware Config

Extracted

Family

formbook

Campaign

m9ae

Decoy

nWTQpX6TYm6dfT3Lcw==

7JaBLgMm8EKn2AlTy5Ksj4Jq

yWRJIhE3viQgqEpZS3o=

ES9dFo0bytF8vlvRcg==

aX/aBZn29pD+cg==

lU64sYOZV7ZVpUy1ag==

9BpOCYAPv8L8TyIFAiTp2PSqLg==

uEJ2RyQ1BcBXfFr8kT5Z1KV0

oVM42Ury9pD+cg==

0Zl3VkcuKaY+

OjZeGI8dw67Z6eWtnOoBfoI=

ytwFn9j4i+N8nKYRSgcfh3xn5LU=

xMb1+YkOyxmbxJ53JsP7Pg==

HODQpzTBS1gVoi4X0hStKQ==

fQ417ycwD+ziKt1u0hStKQ==

nsApOqE62sA8uS735uCXVP+YcrQ=

4aobG3oZ3AHqTPs=

P2LEwJatZbQZUTayTW0=

/bopO7NR6clCfT3Lcw==

bBxRRkFY01R+20pZS3o=

Extracted

Family

xloader

Version

3.Æ…

Campaign

m9ae

Decoy

nWTQpX6TYm6dfT3Lcw==

7JaBLgMm8EKn2AlTy5Ksj4Jq

yWRJIhE3viQgqEpZS3o=

ES9dFo0bytF8vlvRcg==

aX/aBZn29pD+cg==

lU64sYOZV7ZVpUy1ag==

9BpOCYAPv8L8TyIFAiTp2PSqLg==

uEJ2RyQ1BcBXfFr8kT5Z1KV0

oVM42Ury9pD+cg==

0Zl3VkcuKaY+

OjZeGI8dw67Z6eWtnOoBfoI=

ytwFn9j4i+N8nKYRSgcfh3xn5LU=

xMb1+YkOyxmbxJ53JsP7Pg==

HODQpzTBS1gVoi4X0hStKQ==

fQ417ycwD+ziKt1u0hStKQ==

nsApOqE62sA8uS735uCXVP+YcrQ=

4aobG3oZ3AHqTPs=

P2LEwJatZbQZUTayTW0=

/bopO7NR6clCfT3Lcw==

bBxRRkFY01R+20pZS3o=

Targets

    • Target

      Jyoti CNC Automation Ltd.exe

    • Size

      386KB

    • MD5

      76546253ae7de8218aaea566454db844

    • SHA1

      fdeef99c922f422a1d49e7d692391a1afa1ac521

    • SHA256

      dd6ef39d8ed08e7355551c7140b5094d57f5c1bf70549f686ca18b9b1698e468

    • SHA512

      2d261ae2988644b7f0d033dda3aa0309f9f895d50d1539053b20702cf43adc6a1c5484bcf0b3b8ab6ffc7cd16d207c9b3ee518506783da525f2f91814942d1eb

    • SSDEEP

      6144:hBn7A5jMUCoQxOXdAwD6D7OUg00HsWFyChk1ucywA+EpxWGFjSHl:vrsXd1O3OUfDWFyChk+wA+ER2F

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks