General

  • Target

    Purchase order.doc

  • Size

    520KB

  • Sample

    211027-rwallsfba8

  • MD5

    b0e95a4af180627b781257494c5bd43b

  • SHA1

    a660ad6781f25a7a3ce699751495f0cb2adf7196

  • SHA256

    51d82db8f2b1b3d5387e3c400b1a3ad27371e4340343aa4affe4165d51334d90

  • SHA512

    cfca9ff89cbc1bdf2f63c47b4e6b5fdb09af813e357ca9fe07ef26cb48d3aa65cccd32ac96814b36481fe20af5d0342dfe1ed423f607c64a7f9d22954b3f321f

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

jy0b

C2

http://www.filecrev.com/jy0b/

Decoy

lamejorimagen.com

mykabukibrush.com

modgon.com

barefoottherapeutics.com

shimpeg.net

trade-sniper.com

chiangkhancityhotel.com

joblessmoni.club

stespritsubways.com

chico-group.com

nni8.xyz

searchtypically.online

jobsyork.com

bestsales-crypto.com

iqmarketing.info

bullcityphotobooths.com

fwssc.icu

1oc87s.icu

usdiesel.xyz

secrets2optimumnutrition.com

Targets

    • Target

      Purchase order.doc

    • Size

      520KB

    • MD5

      b0e95a4af180627b781257494c5bd43b

    • SHA1

      a660ad6781f25a7a3ce699751495f0cb2adf7196

    • SHA256

      51d82db8f2b1b3d5387e3c400b1a3ad27371e4340343aa4affe4165d51334d90

    • SHA512

      cfca9ff89cbc1bdf2f63c47b4e6b5fdb09af813e357ca9fe07ef26cb48d3aa65cccd32ac96814b36481fe20af5d0342dfe1ed423f607c64a7f9d22954b3f321f

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks