General

  • Target

    c47b64bc3082c59d54077af047c2bcffd0d1859934927dc58ffc14b7ac52a1c8

  • Size

    412KB

  • Sample

    220521-mycfrscfe8

  • MD5

    0f9eb810be9b50a8b2d6c7c7988cb6c5

  • SHA1

    18f4077403d5cb0530ba6c45488480bb534a4117

  • SHA256

    c47b64bc3082c59d54077af047c2bcffd0d1859934927dc58ffc14b7ac52a1c8

  • SHA512

    1343d43a877ffefc9fb22e96071172aabb656334073aa328f9ffbda2cd12220e0fc54d4d5e4acd52a4ee9a274b3ee926f5543852c83c93220ac0be9845248c48

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c38r

Decoy

angleprotool.com

drilldownaccountancy.com

puur-bb.info

laptoprepairbrighton.net

mainstale.com

soketones.com

cohi.ltd

washntivow.com

datajagabon.online

solidlike.com

tapaznoncc.com

deadoralive.site

sharkapexdwal.com

tribun-news.com

67chain.com

paramorphous.net

chicagoxqa.com

301zaq.info

mansfieldpowdercoating.net

stopdizzy.com

Targets

    • Target

      Requirement list.exe

    • Size

      648KB

    • MD5

      5dff100422e961e681af596f5307ba6d

    • SHA1

      68735aa701b4be6df63b0fed0edec4800027836b

    • SHA256

      def5dbf8e48af782ccb741ff6a1e1357af8dcafb701089b7f2d1c0919ae79f05

    • SHA512

      07aab159926347c24b6513c7f34a6fd52804f144ca1ff549aea14105a6bcaea715d8258a684be5fb852e9f33f87b96b991503b826bdef77b1dd2de29ac892c95

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Formbook Payload

    • Adds policy Run key to start application

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks