General

  • Target

    807322fd025e88f5defa36a3d01217b65fc413da

  • Size

    37KB

  • Sample

    210504-88f317vvf2

  • MD5

    3d5e71089c7fef5289f64f4dd6bfff18

  • SHA1

    807322fd025e88f5defa36a3d01217b65fc413da

  • SHA256

    3c0178522688a56c2c3be71f55c5925989ddbab1ae96e5bc8fb16eb2622023d0

  • SHA512

    5fa0af0b1eb523ab171ed29ed7ad4c0446faaeaddec5e5cd161a1ba7f6452d43a2aa4391f141ece757df4ec71549f296ae3b29d0527fa62b329a55f2f4e427e7

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.111bjs.com/ccr/

Decoy

abdullahlodhi.com

jevya.com

knoxvillerestaurant.com

mekarauroko7389.com

cricketspowder.net

johannchirinos.com

orangeorganical.com

libero-tt.com

lorenaegianluca.com

wintab.net

modernmillievintage.com

zgdqcyw.com

jeffabildgaardmd.com

nurulfikrimakassar.com

findyourchef.com

innovationsservicegroup.com

destek-taleplerimiz.com

whfqqco.icu

kosmetikmadeingermany.com

dieteticos.net

Targets

    • Target

      807322fd025e88f5defa36a3d01217b65fc413da

    • Size

      37KB

    • MD5

      3d5e71089c7fef5289f64f4dd6bfff18

    • SHA1

      807322fd025e88f5defa36a3d01217b65fc413da

    • SHA256

      3c0178522688a56c2c3be71f55c5925989ddbab1ae96e5bc8fb16eb2622023d0

    • SHA512

      5fa0af0b1eb523ab171ed29ed7ad4c0446faaeaddec5e5cd161a1ba7f6452d43a2aa4391f141ece757df4ec71549f296ae3b29d0527fa62b329a55f2f4e427e7

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Formbook Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Use of msiexec (install) with remote resource

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

5
T1082

Tasks