General

  • Target

    tmp/b0495e35ad16a70e70563fc8c36c6842836eda10bda0d76ba35d7c2b75aaca69.xls

  • Size

    228KB

  • Sample

    211126-rdz4jsgac6

  • MD5

    54f45cff70eb95664f5a61bb70008bb6

  • SHA1

    e78f47c1b8b21e5355d4975286fed750c29f56d9

  • SHA256

    b0495e35ad16a70e70563fc8c36c6842836eda10bda0d76ba35d7c2b75aaca69

  • SHA512

    d14d0f47453e9e328bd405e0e17095605b0c280b6e86f11c2f40e221c7f72fb769b68b55f4caf020bb86146e1fb555b09c0f80007d01f33b729b4467c32c05ac

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

og2w

C2

http://www.celikkaya.xyz/og2w/

Decoy

drivenexpress.info

pdfproxy.com

zyz999.top

oceanserver1.com

948289.com

nubilewoman.com

ibizadiamonds.com

bosniantv-australia.com

juliehutzell.com

poshesocial.events

icsrwk.xyz

nap-con.com

womansslippers.com

invictusfarm.com

search-panel-avg-rock.rest

desencriptar.com

imperialexoticreptiles.com

agastify.com

strinvstr.com

julianapeloi.com

Targets

    • Target

      tmp/b0495e35ad16a70e70563fc8c36c6842836eda10bda0d76ba35d7c2b75aaca69.xls

    • Size

      228KB

    • MD5

      54f45cff70eb95664f5a61bb70008bb6

    • SHA1

      e78f47c1b8b21e5355d4975286fed750c29f56d9

    • SHA256

      b0495e35ad16a70e70563fc8c36c6842836eda10bda0d76ba35d7c2b75aaca69

    • SHA512

      d14d0f47453e9e328bd405e0e17095605b0c280b6e86f11c2f40e221c7f72fb769b68b55f4caf020bb86146e1fb555b09c0f80007d01f33b729b4467c32c05ac

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks