General

  • Target

    SALAMATH EXPORTS.docx

  • Size

    10KB

  • Sample

    210914-t6dgcsbabp

  • MD5

    12f193f5a91b18567a1dc4c652a9b9f4

  • SHA1

    9c030151be689de05d2391114f437d748b13c8d8

  • SHA256

    32cfaa88c450f72627f502fa72b50b21c3ae2d0199eebbd9f3f750945521678a

  • SHA512

    ab3d112138c3e5e8b303a58ed35df967acdedd4f1e6c9efb419395c6ba6f0224f6ef2f5a429ebdf5842e59df9dcbf83f79f5ad5dd345a88e56efdc1cecb78112

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://cml.lol/tj7g80

Extracted

Family

formbook

Version

4.1

Campaign

m8g0

C2

http://www.corbvalperu.com/m8g0/

Decoy

exclusivecan.com

junzhesuji.com

acces-credit-mutuel.com

iknitvintage.com

solonmodelun.com

debekia.com

peanutskitchen.com

kamanantzin.com

personalmodeststyle.com

qo49.com

googman.site

maisonshahnaz.com

annaalexandrovich.com

californiacashcars.com

ncafashionboutique.com

nsu0.com

cloudfirstlender.com

allforchildren.net

vn80000.com

restroon.com

Targets

    • Target

      SALAMATH EXPORTS.docx

    • Size

      10KB

    • MD5

      12f193f5a91b18567a1dc4c652a9b9f4

    • SHA1

      9c030151be689de05d2391114f437d748b13c8d8

    • SHA256

      32cfaa88c450f72627f502fa72b50b21c3ae2d0199eebbd9f3f750945521678a

    • SHA512

      ab3d112138c3e5e8b303a58ed35df967acdedd4f1e6c9efb419395c6ba6f0224f6ef2f5a429ebdf5842e59df9dcbf83f79f5ad5dd345a88e56efdc1cecb78112

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

      suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

    • suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL

      suricata: ET MALWARE Possible Malicious Macro EXE DL AlphaNumL

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Command-Line Interface

1
T1059

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks