General

  • Target

    12a2e2cc7cbb6a6596a683724d2eb4b83782589c561b9bcf1f9d4aab0cfe97bd

  • Size

    379KB

  • Sample

    220521-nxjdcshdbp

  • MD5

    6f4fce5fdfa84fd2f97ac966274e4d53

  • SHA1

    4697f46f8a237340edec0e162e078917ae90dd3c

  • SHA256

    12a2e2cc7cbb6a6596a683724d2eb4b83782589c561b9bcf1f9d4aab0cfe97bd

  • SHA512

    e699963cc6971e3a64b1cd6fd66d83cfe09aa9a65bf29cd4b1659da36e7178886cd7c02de7af9d746c5335c0ae14e7fd79e67821d8ae6e419f97d42683075899

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

audereventur.com

huro14.com

wwwjinsha155.com

antiquevendor.com

samuraisoulfood.net

traffic4updates.download

hypersarv.com

rapport-happy-wedding.com

rokutechnosupport.online

allworljob.com

hanaleedossmann.com

kauai-marathon.com

bepbosch.com

kangen-international.com

zoneshopemenowz.com

belviderewrestling.com

ipllink.com

sellingforcreators.com

wwwswty6655.com

qtumboa.com

Targets

    • Target

      specification quote.exe

    • Size

      810KB

    • MD5

      299c603f94babfbb8c3603dd391cec98

    • SHA1

      eb9c84751d0e0421ee3ec284a2756885f75c8586

    • SHA256

      65463a82bb20ec1f2d53e93c9e51538d55fff2844c746afc36e7a1c43cce36e4

    • SHA512

      7c5d3ce7efead015fbafa3eb9578ec79eab4d8661f00d82dc4abc19dc98c7d490625de0118ded95fc39bb6d847c9cbb51ab5860023ff856291c9189d136ffe05

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Formbook Payload

    • Adds policy Run key to start application

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks