General

  • Target

    INQ_42-4I090.xlsx

  • Size

    360KB

  • Sample

    211023-fppleacba7

  • MD5

    34f843f6f1b3011a7cdb63753853ef58

  • SHA1

    922ebd64f7ffe9d8548d467b631f6bdf2ede6106

  • SHA256

    fbdb8f368721ccfea456f2e6f232304acff371bdb62a5140b9fc44bd224e0d57

  • SHA512

    ad644134a1af636fc794b49bd35fecd5c3dc778a3a2d2503b3cb3285da43c26b9e133f0ba6bc7f049032ab395e3e0d41bd371ab30b5ef18515b7390c39f7be73

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kzk9

C2

http://www.yourmajordomo.com/kzk9/

Decoy

tianconghuo.club

1996-page.com

ourtownmax.net

conservativetreehose.com

synth.repair

donnachicacreperia.com

tentfull.com

weapp.download

surfersink.com

gattlebusinessservices.com

sebastian249.com

anhphuc.company

betternatureproducts.net

defroplate.com

seattlesquidsquad.com

polarjob.com

lendingadvantage.com

angelsondope.com

goportjitney.com

tiendagrupojagr.com

Targets

    • Target

      INQ_42-4I090.xlsx

    • Size

      360KB

    • MD5

      34f843f6f1b3011a7cdb63753853ef58

    • SHA1

      922ebd64f7ffe9d8548d467b631f6bdf2ede6106

    • SHA256

      fbdb8f368721ccfea456f2e6f232304acff371bdb62a5140b9fc44bd224e0d57

    • SHA512

      ad644134a1af636fc794b49bd35fecd5c3dc778a3a2d2503b3cb3285da43c26b9e133f0ba6bc7f049032ab395e3e0d41bd371ab30b5ef18515b7390c39f7be73

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks