Trojan.XF.FORMULOAD.UFUT
TrojanDownloader:O97M/Dridex.PMSK!MTB (MICROSOFT)
Windows

Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
76,561 bytes
XLS, Other
Yes
18 Nov 2021
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following files:
- %ProgramData%\fjkdgjknfdgfjkdgjknfdg.rtf
- %ProgramData%\api-ms-win-crt-stdio-l1-1-0.mp4
(Note: %ProgramData% is a version of the Program Files folder where any user on a multi-user computer can make changes to programs. This contains application data for all users. This is usually C:\ProgramData on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit), or C:\Documents and Settings\All Users on Windows Server 2003(32-bit), 2000(32-bit) and XP.)
It adds the following processes:
- wmic.exe process call create 'mshta %ProgramData%\fjkdgjknfdgfjkdgjknfdg.rtf'
- wmic process call create "rundll32.exe %ProgramData%\api-ms-win-crt-stdio-l1-1-0.mp4 LZDone"
(Note: %ProgramData% is a version of the Program Files folder where any user on a multi-user computer can make changes to programs. This contains application data for all users. This is usually C:\ProgramData on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit), or C:\Documents and Settings\All Users on Windows Server 2003(32-bit), 2000(32-bit) and XP.)
Other Details
This Trojan connects to the following possibly malicious URL:
- https://cdn.{BLOCKED}app.com/attachments/910212171147915317/910550967668310016/WxDPscgHItkfTniggerjewhitler.mp4
- https://cdn.{BLOCKED}app.com/attachments/910212171147915317/910550751456149534/JvqwnnQpTQVAyniggerjewhitler.mp4
- https://cdn.{BLOCKED}app.com/attachments/910212171147915317/910550529279655966/qcAWeDaQPniggerjewhitler.mp4