General

  • Target

    3eaa45b1b77a0f1b92cec746a2923be593a95f5381293533d5a6759c9d03667e

  • Size

    957KB

  • Sample

    220508-gykt9ahae8

  • MD5

    b8623660b1b26ec220e2a37a55e6bd2d

  • SHA1

    0259af6dd86d4fbc6e08664f339c22ee9a21f61b

  • SHA256

    3eaa45b1b77a0f1b92cec746a2923be593a95f5381293533d5a6759c9d03667e

  • SHA512

    00ccc39be883518d7a1e49a3b3e03816c25c87add553d78cf8ccc693572a9025c1f14d656c96f998d1461d7e22dd8b605d8eb18338c68feace26e3f4e6be28d8

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

emh

Decoy

nispvisaservice.com

nikhigiovani.com

weddingmotions.com

villaorhome.com

tikigolf3d.com

mndesignw.com

jeeugae.com

xn--80ayhfu4d.xn--80asehdb

alpinefall.com

circespa.com

digiqsalon.com

kangzhanxian.com

fourleaftextiles.com

inclusivehealthresearch.com

zhongruiyintai.com

xobowoa.space

tiantipaihangbang.com

friendsofricoelmore.net

abalto.xyz

elisautodetailingllc.com

Targets

    • Target

      3eaa45b1b77a0f1b92cec746a2923be593a95f5381293533d5a6759c9d03667e

    • Size

      957KB

    • MD5

      b8623660b1b26ec220e2a37a55e6bd2d

    • SHA1

      0259af6dd86d4fbc6e08664f339c22ee9a21f61b

    • SHA256

      3eaa45b1b77a0f1b92cec746a2923be593a95f5381293533d5a6759c9d03667e

    • SHA512

      00ccc39be883518d7a1e49a3b3e03816c25c87add553d78cf8ccc693572a9025c1f14d656c96f998d1461d7e22dd8b605d8eb18338c68feace26e3f4e6be28d8

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook Payload

    • Adds policy Run key to start application

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

5
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks