General

  • Target

    New -PO January.xlsx

  • Size

    2.0MB

  • Sample

    210114-dnpxjg3a8n

  • MD5

    23bbc2d2c1f6938d9f701bd185ae52b8

  • SHA1

    d90da454ef1ba74843356d00190b5232cf848b4f

  • SHA256

    1d4245f324118521fb7eb936379da4a25cb5101d5634f21376fa196663efdc35

  • SHA512

    5809706d71109adeee4f08980197b1dd7ced0f2dd584eff24a922749139241fc7b04323dfc54552e79cff4e75e77e554d15acbce3c14d96e69510acf17101311

Malware Config

Extracted

Family

formbook

C2

http://www.thesiromiel.com/kgw/

Decoy

valentinakasu.com

soyelmatador.com

collaborativeprosperity.com

power8brokers.com

nexus-ink.com

manpasandmeatmarket.com

the-ethical-forums.today

maryannpark.com

bikininbodymommy.com

pxwuo.com

bigbangmerch.com

okaysinger.com

shopcarpe.com

rainbowhillsswimclub.com

crifinmarket.com

ebl-play.net

forceandsonsequipment.com

viagraytqwi.com

latashashop.com

suffocatinglymundanepodcast.com

Targets

    • Target

      New -PO January.xlsx

    • Size

      2.0MB

    • MD5

      23bbc2d2c1f6938d9f701bd185ae52b8

    • SHA1

      d90da454ef1ba74843356d00190b5232cf848b4f

    • SHA256

      1d4245f324118521fb7eb936379da4a25cb5101d5634f21376fa196663efdc35

    • SHA512

      5809706d71109adeee4f08980197b1dd7ced0f2dd584eff24a922749139241fc7b04323dfc54552e79cff4e75e77e554d15acbce3c14d96e69510acf17101311

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook Payload

    • Looks for VirtualBox Guest Additions in registry

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks