Resubmissions

21-02-2022 12:32

220221-pqletaabf3 10

21-02-2022 10:50

220221-mxbsvaaaap 10

General

  • Target

    налог за купување pdf.exe

  • Size

    758KB

  • Sample

    220221-pqletaabf3

  • MD5

    79488bd73bf0e3f4d2e4b87c3e3b3fc2

  • SHA1

    e832dab0dcc66e8afc4b0ddd4748893386d10e68

  • SHA256

    8c3f224cf0567bbd99154105d471e29b60f5e5c0afb2683be992c9f702a7e7d9

  • SHA512

    d894a09daf58a67b63767769638add7483ce202b914b686f14bfe0bccd12aeaf8c715b8d006c2bef8ac8c54cfeb2c762673fb62659f93983c43befe03916fbdf

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2m3

Decoy

stocktonfingerprinting.com

metaaiqr.com

junicy.com

libertymutualgrou.com

jklhs7gl.xyz

alex-covalcova.space

socialfiguild.com

drnicholasreid.com

androidappprogrammierie.com

relatingtohumans.com

jitsystems.com

gbwpmz.com

lesaventuresdecocomango.com

wu8ggqdv077p.xyz

autnvg.com

wghakt016.xyz

lagosian.store

hilldoor.com

oculos-ajustavel-br.xyz

nameniboothac.com

Targets

    • Target

      налог за купување pdf.exe

    • Size

      758KB

    • MD5

      79488bd73bf0e3f4d2e4b87c3e3b3fc2

    • SHA1

      e832dab0dcc66e8afc4b0ddd4748893386d10e68

    • SHA256

      8c3f224cf0567bbd99154105d471e29b60f5e5c0afb2683be992c9f702a7e7d9

    • SHA512

      d894a09daf58a67b63767769638add7483ce202b914b686f14bfe0bccd12aeaf8c715b8d006c2bef8ac8c54cfeb2c762673fb62659f93983c43befe03916fbdf

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook Payload

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks