General

  • Target

    Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.7z

  • Size

    709KB

  • Sample

    221208-trwdmadd9y

  • MD5

    afcd1a67a96aa2ba2a15bb9a46e577c7

  • SHA1

    abe9dedbb1176547b1ee66b79691182b35b1edcf

  • SHA256

    de2141608c60fc5b719e73212046e8c053c99fb425970af74d606fc3dee4e440

  • SHA512

    0a651e93ac1a524faed3ee9827d475265cb7832a43f353b4cdd179c0798e53f481b62f815b97e8b1b87229fb39733152f2488b0f46ad4fb724abbc52b6195431

  • SSDEEP

    12288:eQvV8mwJ6g9hL7ji1wXbekvhhw77ZZiMMHSWtyQ0pi+3dMJPFq7nkYtPzvbJu:eaV8mwJF8abekZaS4Q0F3dCPSkO7vbg

Malware Config

Extracted

Family

formbook

Campaign

m9ae

Decoy

nWTQpX6TYm6dfT3Lcw==

7JaBLgMm8EKn2AlTy5Ksj4Jq

yWRJIhE3viQgqEpZS3o=

ES9dFo0bytF8vlvRcg==

aX/aBZn29pD+cg==

lU64sYOZV7ZVpUy1ag==

9BpOCYAPv8L8TyIFAiTp2PSqLg==

uEJ2RyQ1BcBXfFr8kT5Z1KV0

oVM42Ury9pD+cg==

0Zl3VkcuKaY+

OjZeGI8dw67Z6eWtnOoBfoI=

ytwFn9j4i+N8nKYRSgcfh3xn5LU=

xMb1+YkOyxmbxJ53JsP7Pg==

HODQpzTBS1gVoi4X0hStKQ==

fQ417ycwD+ziKt1u0hStKQ==

nsApOqE62sA8uS735uCXVP+YcrQ=

4aobG3oZ3AHqTPs=

P2LEwJatZbQZUTayTW0=

/bopO7NR6clCfT3Lcw==

bBxRRkFY01R+20pZS3o=

Extracted

Family

xloader

Version

3.Æ…

Campaign

m9ae

Decoy

nWTQpX6TYm6dfT3Lcw==

7JaBLgMm8EKn2AlTy5Ksj4Jq

yWRJIhE3viQgqEpZS3o=

ES9dFo0bytF8vlvRcg==

aX/aBZn29pD+cg==

lU64sYOZV7ZVpUy1ag==

9BpOCYAPv8L8TyIFAiTp2PSqLg==

uEJ2RyQ1BcBXfFr8kT5Z1KV0

oVM42Ury9pD+cg==

0Zl3VkcuKaY+

OjZeGI8dw67Z6eWtnOoBfoI=

ytwFn9j4i+N8nKYRSgcfh3xn5LU=

xMb1+YkOyxmbxJ53JsP7Pg==

HODQpzTBS1gVoi4X0hStKQ==

fQ417ycwD+ziKt1u0hStKQ==

nsApOqE62sA8uS735uCXVP+YcrQ=

4aobG3oZ3AHqTPs=

P2LEwJatZbQZUTayTW0=

/bopO7NR6clCfT3Lcw==

bBxRRkFY01R+20pZS3o=

Targets

    • Target

      Payment Advice - Advice Ref A1T4C80vSIxi ACH credits Customer Ref1093817130.exe

    • Size

      1.0MB

    • MD5

      af4c90f16183a6ad67d309954e852c8a

    • SHA1

      4b8612090c079bf462c55e774c7199d4f182e937

    • SHA256

      e42dddf5106613702329f2fa39feac15baee21cd5b543d288dc82ed621eb7037

    • SHA512

      c335c1ab1b2708530424dc094a9b864155275e4d462bf726b38338b9c33f6942c355b9092fa786bf1a20f99c7ac52b4c03e399ff5ab157fff556480db15fc823

    • SSDEEP

      12288:0oQgKZ/nXt7virmWhlGLaQYIyzYEmgX/Lifi1SXAe73hdw7YVCiJM2dycvQ0piws:fPNNwAe7x78OQ0Hx4xUhlWp

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks