PO1-424480.xlsx

General
Target

PO1-424480.xlsx

Size

369KB

Sample

211020-g8ee8agfe6

Score
10 /10
MD5

a90498a98fd4e3803268afe60f0aef3b

SHA1

a7b98908a7b24fd111e80a37e5b16c175abd3e42

SHA256

e22b44c2d8530896f22ebdf8b1bc5f749c239047a64143d2eb3dee32a0eee5ba

SHA512

d3da10ab37606c389bd53888750e0406dda1b67458a7190214dfc6e244d8e00ae4abce8907e11e69d31171c4fb7f9d202385c1e659f0ec441ba13271a40d1998

Malware Config

Extracted

Family formbook
Version 4.1
Campaign kzk9
C2

http://www.yourmajordomo.com/kzk9/

Decoy

tianconghuo.club

1996-page.com

ourtownmax.net

conservativetreehose.com

synth.repair

donnachicacreperia.com

tentfull.com

weapp.download

surfersink.com

gattlebusinessservices.com

sebastian249.com

anhphuc.company

betternatureproducts.net

defroplate.com

seattlesquidsquad.com

polarjob.com

lendingadvantage.com

angelsondope.com

goportjitney.com

tiendagrupojagr.com

self-care360.com

foreignexchage.com

loan-stalemate.info

hrsimrnsingh.com

laserobsession.com

primetimesmagazine.com

teminyulon.xyz

kanoondarab.com

alpinefall.com

tbmautosales.com

4g2020.com

libertyquartermaster.com

flavorfalafel.com

generlitravel.com

solvedfp.icu

jamnvibez.com

zmx258.com

doudiangroup.com

dancecenterwest.com

ryantheeconomist.com

beeofthehive.com

bluelearn.world

vivalasplantas.com

yumiacraftlab.com

shophere247365.com

enjoybespokenwords.com

windajol.com

ctgbazar.xyz

afcerd.com

dateprotect.com

Targets
Target

PO1-424480.xlsx

MD5

a90498a98fd4e3803268afe60f0aef3b

Filesize

369KB

Score
10/10
SHA1

a7b98908a7b24fd111e80a37e5b16c175abd3e42

SHA256

e22b44c2d8530896f22ebdf8b1bc5f749c239047a64143d2eb3dee32a0eee5ba

SHA512

d3da10ab37606c389bd53888750e0406dda1b67458a7190214dfc6e244d8e00ae4abce8907e11e69d31171c4fb7f9d202385c1e659f0ec441ba13271a40d1998

Tags

Signatures

  • Formbook

    Description

    Formbook is a data stealing malware which is capable of stealing data.

    Tags

  • Formbook Payload

    Tags

  • Blocklisted process makes network request

  • Downloads MZ/PE file

  • Executes dropped EXE

  • Loads dropped DLL

  • Uses the VBS compiler for execution

    TTPs

    Scripting
  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1

                    behavioral2

                    1/10