General

  • Target

    Payment Details.xlsx

  • Size

    229KB

  • Sample

    211125-vf983sfhcj

  • MD5

    f49e322b837835ac60cad8c173ecff31

  • SHA1

    c7cddfbf865b528d1bbbbe5c5f3974279cc8b6f5

  • SHA256

    ff4e17d62ce9c71164879418e7942cecf8db37b16cb66adebc6c2570840f8524

  • SHA512

    c5ce7feb4a44d0a3c0ba17c1104d599409c66c1a36e68f382df9048e18f02349c16cf4de21437f988e4779ce56847b9574dd83562dd1239bc88358922e2826b9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

C2

http://www.blancheshelley.xyz/g2fg/

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Payment Details.xlsx

    • Size

      229KB

    • MD5

      f49e322b837835ac60cad8c173ecff31

    • SHA1

      c7cddfbf865b528d1bbbbe5c5f3974279cc8b6f5

    • SHA256

      ff4e17d62ce9c71164879418e7942cecf8db37b16cb66adebc6c2570840f8524

    • SHA512

      c5ce7feb4a44d0a3c0ba17c1104d599409c66c1a36e68f382df9048e18f02349c16cf4de21437f988e4779ce56847b9574dd83562dd1239bc88358922e2826b9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks