General

  • Target

    purchase order.xlsx

  • Size

    725KB

  • Sample

    211107-2hg4msgcdq

  • MD5

    ecd842843aac496b09d75bf3dc1f06c5

  • SHA1

    6bd36c2f76df190ce48f504ffc6325dd6ba2773e

  • SHA256

    909edf71e133133e2ab16765d7fd9cc825042c1a25e7f682dbcc8405cfabb48d

  • SHA512

    eabd389ccfcfb4a2e2eb31a44b1c128d6d794003caf8b8e46364c16bd315a21d02deb80aa919c128b6ab28626a76ca9e322b55c685a1136ebcf6fb0a9de09b48

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

jy0b

C2

http://www.filecrev.com/jy0b/

Decoy

lamejorimagen.com

mykabukibrush.com

modgon.com

barefoottherapeutics.com

shimpeg.net

trade-sniper.com

chiangkhancityhotel.com

joblessmoni.club

stespritsubways.com

chico-group.com

nni8.xyz

searchtypically.online

jobsyork.com

bestsales-crypto.com

iqmarketing.info

bullcityphotobooths.com

fwssc.icu

1oc87s.icu

usdiesel.xyz

secrets2optimumnutrition.com

Targets

    • Target

      purchase order.xlsx

    • Size

      725KB

    • MD5

      ecd842843aac496b09d75bf3dc1f06c5

    • SHA1

      6bd36c2f76df190ce48f504ffc6325dd6ba2773e

    • SHA256

      909edf71e133133e2ab16765d7fd9cc825042c1a25e7f682dbcc8405cfabb48d

    • SHA512

      eabd389ccfcfb4a2e2eb31a44b1c128d6d794003caf8b8e46364c16bd315a21d02deb80aa919c128b6ab28626a76ca9e322b55c685a1136ebcf6fb0a9de09b48

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks