General

  • Target

    cbc831d19e29947144c416d0ab032ea3ef32b01f2bcfc0bd874b2c301cbeaf6b

  • Size

    403KB

  • Sample

    220221-l5gtdseecl

  • MD5

    eeefff887bdc06635df0c6f1df648388

  • SHA1

    cb1fdad1f83a051a8234bbdbac399330f3b65c9f

  • SHA256

    cbc831d19e29947144c416d0ab032ea3ef32b01f2bcfc0bd874b2c301cbeaf6b

  • SHA512

    d207293cbcfbdbc844878cd328af3f2386d45888f30eaa9df21d443a951bdef36f514af08198e957b62a75b1a29c617c48459e683c098a66151a56af1fb4b295

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

audereventur.com

huro14.com

wwwjinsha155.com

antiquevendor.com

samuraisoulfood.net

traffic4updates.download

hypersarv.com

rapport-happy-wedding.com

rokutechnosupport.online

allworljob.com

hanaleedossmann.com

kauai-marathon.com

bepbosch.com

kangen-international.com

zoneshopemenowz.com

belviderewrestling.com

ipllink.com

sellingforcreators.com

wwwswty6655.com

qtumboa.com

Targets

    • Target

      yeni sipari? pdf.exe

    • Size

      855KB

    • MD5

      b66417695e3a8844a9ee9fa5828bfd8c

    • SHA1

      701f2da68cfe095527a6c66fd6aee55204eb57d9

    • SHA256

      8f10623db4fc1e8289a02e94db58942a94a25c59a06e559fa910094da3db7e9d

    • SHA512

      98121e7d46376026499e450c519d012e721a14b075e46e711b077a7beb507a77dc3a4e4264cd9e52346c88e56a8607235e942f29be504f72d837e8de7dba242d

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Formbook Payload

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks