General

  • Target

    Quotation.xlsx

  • Size

    187KB

  • Sample

    220125-lq333sdcdl

  • MD5

    5df4a038cc4bba817a9daff5fc087a43

  • SHA1

    8834957b839145353b4b7ba7dadad4283db5dc64

  • SHA256

    65e00716aa71025d9cb4c8a9d84fe400fc09e97ad9dc1c0587cbb995ca9edbe8

  • SHA512

    f6bfad5a8d61b701d3031e89999020d225a5db6d5d8b79f96e778005c4ef00703e0bbe0a25e4fe52887d261fda29fc4ff6610c55b152ce98f16fb901928af865

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Quotation.xlsx

    • Size

      187KB

    • MD5

      5df4a038cc4bba817a9daff5fc087a43

    • SHA1

      8834957b839145353b4b7ba7dadad4283db5dc64

    • SHA256

      65e00716aa71025d9cb4c8a9d84fe400fc09e97ad9dc1c0587cbb995ca9edbe8

    • SHA512

      f6bfad5a8d61b701d3031e89999020d225a5db6d5d8b79f96e778005c4ef00703e0bbe0a25e4fe52887d261fda29fc4ff6610c55b152ce98f16fb901928af865

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks