General

  • Target

    33b1ceb947efe5ce7ace07a0790c5ff4eaf7f2b0ee78dafdbeee51c7df1322ce

  • Size

    358KB

  • Sample

    220521-mzt27scgd4

  • MD5

    0a7efc3b912f71df3e25b61c35307300

  • SHA1

    9c2e0dff2a7e72b3371b7d9e3c0bcf852dbf1721

  • SHA256

    33b1ceb947efe5ce7ace07a0790c5ff4eaf7f2b0ee78dafdbeee51c7df1322ce

  • SHA512

    cacf415994cd083dc07ab97fd7213e4c5e1beeeba1b3f843b2ea1d0ce6bbf82e28917db148c7025d0667adc34f0a0df20970e6b2fe2967caa4b7aea1b74cc7a4

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

audereventur.com

huro14.com

wwwjinsha155.com

antiquevendor.com

samuraisoulfood.net

traffic4updates.download

hypersarv.com

rapport-happy-wedding.com

rokutechnosupport.online

allworljob.com

hanaleedossmann.com

kauai-marathon.com

bepbosch.com

kangen-international.com

zoneshopemenowz.com

belviderewrestling.com

ipllink.com

sellingforcreators.com

wwwswty6655.com

qtumboa.com

Targets

    • Target

      SWIFT DOZNAKA.exe

    • Size

      655KB

    • MD5

      af3108b6d0e79e10bbe7d41569329242

    • SHA1

      f0664a4be7c9b187f441912c342466d1f1952b84

    • SHA256

      85774cdd3163c5e259dafdf67b113fd69fa8f4f9ebd964ee91b099bd2f58ebfd

    • SHA512

      7f62d22804daf98e2ccc7176834f089aafca465e7f971eb9f64720003c57dc7888eddb709bfd4858ced5ab6261a220d610c47e0a6a31c2f296adb32ad5bc8180

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Formbook Payload

    • Adds policy Run key to start application

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks