General

  • Target

    a703fd2372483e4bbb75bc96dd4f0f95c489eede136451016106eb6c62636658

  • Size

    1.2MB

  • Sample

    220521-bqjpbsfcfq

  • MD5

    a1244ca67b926fae807a19950991128f

  • SHA1

    bfd56771284560488f9e28f65840880d7f130166

  • SHA256

    a703fd2372483e4bbb75bc96dd4f0f95c489eede136451016106eb6c62636658

  • SHA512

    25d36aac5e1fef344ddc1be9db97771e01597de9aa1ad3b36da9d5c6cb5188b9fa1b8902d6f5c161c20a3ad88d039de8f0f7cb828a9272824b7e325557132c4f

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

23v

Decoy

1l4m-5qeh0cgx9a.com

portsel.com

vypnxg.men

renrenbaoshangcheng.com

hulebang.com

heatburnio.com

amazingthunderworks.com

quantumreapers.com

8801i.info

moonlightmanager.com

bqypm.info

backlinkbarato.com

jiudianhuixun.com

markerbio.net

empety.com

eternalkollection.com

teknoshift.com

petitenobel.net

zlmqv.info

emotionalcontrols.com

Targets

    • Target

      BANK_LET.EXE

    • Size

      339KB

    • MD5

      86bb43248e3ad56e9a839cc6c7b03282

    • SHA1

      30afc80c7a9d14fb54cd799b2b2d552c9f2e138d

    • SHA256

      286add28a79440668077a7d762ee81ee169f1c08daa27bc680dbf8c8832d2785

    • SHA512

      17716ec8e1dbee062a3534eab62e0ba4b793ec94d6f64043493dfddb8424bd0d6a7d792e26d628f86d6acbf18ba671817d30ba243ebbac5a7b4255f8e19a6cc1

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Modifies Windows Defender Real-time Protection settings

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Formbook Payload

    • Looks for VirtualBox Guest Additions in registry

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Windows security modification

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks