General

  • Target

    93fc98148dbcc6f16b8f6ca1d8bd6bc68eafb2b4b68e697135561f5845cf82b8

  • Size

    656KB

  • Sample

    220227-d6bd1adaem

  • MD5

    68378be4104c3c2755528a8b220bed75

  • SHA1

    73669194e71efa0b222ffd27625783ea25382712

  • SHA256

    93fc98148dbcc6f16b8f6ca1d8bd6bc68eafb2b4b68e697135561f5845cf82b8

  • SHA512

    1e1d08152bfd2f71b5aeeae8b506af8003f413bf79611a43467a7a1ff08c7aa664444f4166c00fb2b27be0a1cfb8311ebfce82988aa0f69d9ab77e15be10f0a9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

Decoy

bakecakesandmore.com

shenglisuoye.com

chinapopfactory.com

ynlrhd.com

liqourforyou.com

leonqamil.com

meccafon.com

online-marketing-strategie.biz

rbfxi.com

frseyb.info

leyu91.com

hotsmail.today

beepot.tech

dunaemmetmobility.com

sixpenceworkshop.com

incrediblefavorcoaching.com

pofo.info

yanshudaili.com

yellowbrickwedding.com

paintpartyblueprint.com

Targets

    • Target

      93fc98148dbcc6f16b8f6ca1d8bd6bc68eafb2b4b68e697135561f5845cf82b8

    • Size

      656KB

    • MD5

      68378be4104c3c2755528a8b220bed75

    • SHA1

      73669194e71efa0b222ffd27625783ea25382712

    • SHA256

      93fc98148dbcc6f16b8f6ca1d8bd6bc68eafb2b4b68e697135561f5845cf82b8

    • SHA512

      1e1d08152bfd2f71b5aeeae8b506af8003f413bf79611a43467a7a1ff08c7aa664444f4166c00fb2b27be0a1cfb8311ebfce82988aa0f69d9ab77e15be10f0a9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Formbook Payload

    • Adds policy Run key to start application

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks