General

  • Target

    Quotation.xlsx

  • Size

    187KB

  • Sample

    220127-qbjhcadbam

  • MD5

    b23f5b2d0dd2b26171acf1b853bd7fa1

  • SHA1

    c59ef6b1adbeea79ac12304e6c2b6d1bba326b21

  • SHA256

    ea2eb32bfadd49c0bc833a50ed2b7d73f42175378fb2e7ff53e3612b5ae8f6f1

  • SHA512

    c6452622f0b262d7eb168a4946106ed7d32af0edc265ac9ab4b704a2099ba41ac1dba9faeb40828b02d8566e9c8a928dee548aa6adc697caf5b888df08dbc1e6

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Quotation.xlsx

    • Size

      187KB

    • MD5

      b23f5b2d0dd2b26171acf1b853bd7fa1

    • SHA1

      c59ef6b1adbeea79ac12304e6c2b6d1bba326b21

    • SHA256

      ea2eb32bfadd49c0bc833a50ed2b7d73f42175378fb2e7ff53e3612b5ae8f6f1

    • SHA512

      c6452622f0b262d7eb168a4946106ed7d32af0edc265ac9ab4b704a2099ba41ac1dba9faeb40828b02d8566e9c8a928dee548aa6adc697caf5b888df08dbc1e6

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks