General

  • Target

    a260058a1fd26d9661a5258ef8deba43c34718a49da63ba059d21a7a6c1778de

  • Size

    266KB

  • Sample

    220521-cwfejaeeg4

  • MD5

    840b556e294a738229690a21625c1e27

  • SHA1

    7cfeb2b0500452bd21a0bfac14faf8533602246c

  • SHA256

    a260058a1fd26d9661a5258ef8deba43c34718a49da63ba059d21a7a6c1778de

  • SHA512

    88653a97ceda6a97aed4e58d96fe9c1e9cd5e2e5545465702d24ad79ff7a95eb75da2a24ce59c330d3ef326d42e2e7919fdba5c1ca338e3ed6563179db271390

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

wdm

Decoy

rutherfordwomansclub.net

theclassicapplique.com

7-zd.com

kmngeg.info

claudinelloriot.com

bitcoinpride.info

mfmhdev.com

eenhar.com

onlinesmartnews.com

utilitariostucuman.com

find-quality-rentalcar.com

bodyartdnvr.science

silverfoxtail.com

zbrunda.com

killosaurus.com

heatheratl.com

xn--xhq30huts43cgs2e.com

lipmat.com

gegdon.net

foxinsurancedmv.com

Targets

    • Target

      PURCHASE ORDER NO7654567.exe

    • Size

      298KB

    • MD5

      ab99d25b2996150cc085ab8eae483f2d

    • SHA1

      84f5200e330d6d4be843564d3494056a90da8fad

    • SHA256

      a46eb9ad512b0b9355c24ab2320a1cd25758bc5e90485a476596982d41f9fe56

    • SHA512

      cb328d225b61ce7231579488d29f62e5cef2fb9944abe8b5915fd86a264b76f794cd7bf12e5536a218cfcfcd38fe76e7c7a3dbd1e6fe0300cf33979b84929a0b

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Formbook Payload

    • Looks for VirtualBox Guest Additions in registry

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks