General

  • Target

    RFQ-450987643.doc

  • Size

    1.5MB

  • Sample

    210118-b9tsne8acn

  • MD5

    d1e131610fac2e4923e4b41c143930c0

  • SHA1

    b697187ded059e330e334e8959b500b2720b7498

  • SHA256

    fe0ebbec69296e6fa9073104bb2f1448bdeeeb040511af7b3bad04fa529da38c

  • SHA512

    b013702eb35285c77b950023b86e8f1a30648a7fbc7e3a89edb9bd3df17506cd33ba4f92f35998db637e7fc1a9b5d72a756957a21a825c202cc48e16ed0d4852

Malware Config

Extracted

Family

formbook

C2

http://www.priscilafiorini.com/rcm/

Decoy

stunninggfe-ready.today

mlmtalks.com

mountainpeakcafe.com

vlmportraits.com

broskiusa.com

yunquenet.com

webinargifts.com

theatomicclean.com

baselinefibertothehome.net

newworldnails.net

plbmw.com

natsringswerp.com

h2o4all.life

alcoholxpress.com

heliumantennaguide.com

amazon-account-app-service.com

gandhiinfotech.com

abacapitals.com

daoxfi.com

radiocota.com

Targets

    • Target

      RFQ-450987643.doc

    • Size

      1.5MB

    • MD5

      d1e131610fac2e4923e4b41c143930c0

    • SHA1

      b697187ded059e330e334e8959b500b2720b7498

    • SHA256

      fe0ebbec69296e6fa9073104bb2f1448bdeeeb040511af7b3bad04fa529da38c

    • SHA512

      b013702eb35285c77b950023b86e8f1a30648a7fbc7e3a89edb9bd3df17506cd33ba4f92f35998db637e7fc1a9b5d72a756957a21a825c202cc48e16ed0d4852

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Formbook Payload

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks