General

  • Target

    5fd570bf6d0b40faa4d64a39dcc7a2a93220e8999e0e4296b967a50413a691b2

  • Size

    431KB

  • Sample

    230210-lprcwsgc9s

  • MD5

    2f4004a7c35aab17d292814c4a75ddf1

  • SHA1

    6892b5fdea2c09e09f88b71b1f690cb39b2e8680

  • SHA256

    5fd570bf6d0b40faa4d64a39dcc7a2a93220e8999e0e4296b967a50413a691b2

  • SHA512

    4ee8cda276fb4e6c3338bbe6b68d74ee6465a6d0a3fe852ef2cff63d68f54cf33038578e7720866619c97ca9729508ae4b78de449d8cc08e5a57052aedc2350e

  • SSDEEP

    6144:WYa6iEHEEEzmNjVGb94lw0ByZD8zzORQdFEWoTjhiyUe/w/GtMavE/kcSF:WYwm7C94esXPdFpZJ/GtMav+FSF

Malware Config

Extracted

Family

formbook

Campaign

u8ow

Decoy

uzhDDUNgg10rOh8rkUMGYiLuNnRWl9gwMQ==

bfkA4IUaSgYi7IA=

ezX5yHeR21O3h2RCgQ==

x3E4ntHeLMGQm0kdTi6PJtjOVS6Em8UaKA==

xJuAYwcZLAfqrVazWjvkirgFxDSf

qrGugLdannLYegX5dCtFMA==

i61nMddueAYi7IA=

RoNMKNhtdDWpeiYoaB37TPiHTLo=

RFj3UHHrDtAktSZhYku36opnsaMbNA==

lx0g+6RPl4jwwNPRPuTD

MyEQ4oGk6vXrMM4V

0IVWH0rfKe1J4nn6J9XB

SYVlN3Zrnq2OaWpDiQ==

fNa0jy3P8KQK25rpmwqd0t8=

UZuSZpW+9ffX9KXzmgqd0t8=

Vxf85YCWvYNZjkcDdCtFMA==

0gG1EzLP7/DrMM4V

WExRGVAEE6YS5tJkTxMhR636+A==

6Tv7U4QdURt1KUI+gw==

ooR7RXgsXPtaEutnaQ3efjIXmfJePavzIA==

Targets

    • Target

      5fd570bf6d0b40faa4d64a39dcc7a2a93220e8999e0e4296b967a50413a691b2

    • Size

      431KB

    • MD5

      2f4004a7c35aab17d292814c4a75ddf1

    • SHA1

      6892b5fdea2c09e09f88b71b1f690cb39b2e8680

    • SHA256

      5fd570bf6d0b40faa4d64a39dcc7a2a93220e8999e0e4296b967a50413a691b2

    • SHA512

      4ee8cda276fb4e6c3338bbe6b68d74ee6465a6d0a3fe852ef2cff63d68f54cf33038578e7720866619c97ca9729508ae4b78de449d8cc08e5a57052aedc2350e

    • SSDEEP

      6144:WYa6iEHEEEzmNjVGb94lw0ByZD8zzORQdFEWoTjhiyUe/w/GtMavE/kcSF:WYwm7C94esXPdFpZJ/GtMav+FSF

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks