General

  • Target

    7e92e7af29e8cb16c927d7d0fa0255b69a44ce44.xlsx

  • Size

    343KB

  • Sample

    211018-m57kgsedar

  • MD5

    9bcd3b345d6eff5fbf800c35330a0bde

  • SHA1

    7e92e7af29e8cb16c927d7d0fa0255b69a44ce44

  • SHA256

    154e8841faee60e1f21fca5eb5b8db213d12e0a4ff89cb411326a30348c5807d

  • SHA512

    defd4feb460063a6ffae0f5d98ded97e5ba5b15d2244c43113b55396ec34621bf82e2013ee666e1b4d53c578431bfd9848a7540e7c3ac3cf2f1a45b2cdc6de14

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

s6tn

C2

http://www.majordomus-gliwice.com/s6tn/

Decoy

ya-volna.com

nakimura.online

buildtheyamato.com

carecard.xyz

orthozayn.com

sitd.xyz

garu.club

alfainfocom.com

floridalacrossecamps.com

banytus.xyz

dogodipiskot.quest

ljlsaf.com

shaheenricemills.com

cuevieujni.info

chrisandkcollection.com

sunadokei.website

hoidotsbirky.quest

creditassociatesllc.com

amazonhrjobs.com

the-luggage-dropp-off.com

Targets

    • Target

      7e92e7af29e8cb16c927d7d0fa0255b69a44ce44.xlsx

    • Size

      343KB

    • MD5

      9bcd3b345d6eff5fbf800c35330a0bde

    • SHA1

      7e92e7af29e8cb16c927d7d0fa0255b69a44ce44

    • SHA256

      154e8841faee60e1f21fca5eb5b8db213d12e0a4ff89cb411326a30348c5807d

    • SHA512

      defd4feb460063a6ffae0f5d98ded97e5ba5b15d2244c43113b55396ec34621bf82e2013ee666e1b4d53c578431bfd9848a7540e7c3ac3cf2f1a45b2cdc6de14

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks