General

  • Target

    bc3a9a02daa782f52ec830c499b4c6b262a462f5f6c3f05dce1bfe14183be54e

  • Size

    267KB

  • Sample

    220521-bpp5qafcck

  • MD5

    dd6b6882d998bc5ddf33495bf5441012

  • SHA1

    6fb2fcfb74e9492ad6d7d0c625db1c9194875501

  • SHA256

    bc3a9a02daa782f52ec830c499b4c6b262a462f5f6c3f05dce1bfe14183be54e

  • SHA512

    6962f2bf544a9fe98744a19b240937a9009b466dd965df4eeedf1daa234006f1c479eabeda80c9f6be152d139c9c9a429941fe4e4eb2675578ad8b38ed164492

Malware Config

Extracted

Family

formbook

Version

4.0

Campaign

g8u

Decoy

stuition.com

mj-sculpture.com

cannatainmentevents.com

dianjintang.com

rmlusitania.info

effet-spiruline.com

flatheme.com

supergaminator-vip.com

craftyourmagic.com

lakai.ltd

electionshawaii.com

iqpdct.com

thebestfourstarhotels.com

satoshiceo.com

saintmartiner.com

brothersmarinetoronto.com

citicoin.online

scentsationalsniffers.com

hellonighbourgameees.com

displayonline-france.com

Targets

    • Target

      Salary.exe

    • Size

      352KB

    • MD5

      6d5f3175c300da6ea8a6875a4682edd9

    • SHA1

      ebf2ab3c7fa3cd6f3dcb16e8d1f8faedb16bd7e6

    • SHA256

      4f5081f499127a975be464ff8bb659d88a455cf17da0579c20732097507b6226

    • SHA512

      5dcddce714ce32048466d51d59fcfa84e2949ae01f3b8f0add3f871e03b80f964649963f51ea62bff190bb16fdb0e31bf3802f3fa33d4fc5b1c604da9399720d

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Formbook Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Adds policy Run key to start application

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks