General

  • Target

    acc4d8e95dd29d9938aa45721d589407dd9e2712e6035d620068709c1bbe600e

  • Size

    241KB

  • Sample

    220521-xew16sbeg6

  • MD5

    45b61bca34efec06eba0469fe2003b55

  • SHA1

    a2c05569f3205d6d682ea409293469867489f729

  • SHA256

    acc4d8e95dd29d9938aa45721d589407dd9e2712e6035d620068709c1bbe600e

  • SHA512

    eda1cafbb7c3497e009feabe99d157b8a392b401ee9a96589e9ea3d375ec5796f81b1a8e092a77750f92f601b15bc84d7df2495b7390f40c3b896a46cd1d1224

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

audereventur.com

huro14.com

wwwjinsha155.com

antiquevendor.com

samuraisoulfood.net

traffic4updates.download

hypersarv.com

rapport-happy-wedding.com

rokutechnosupport.online

allworljob.com

hanaleedossmann.com

kauai-marathon.com

bepbosch.com

kangen-international.com

zoneshopemenowz.com

belviderewrestling.com

ipllink.com

sellingforcreators.com

wwwswty6655.com

qtumboa.com

Targets

    • Target

      products samples.exe

    • Size

      494KB

    • MD5

      e64f048c8c196195443a74e911748666

    • SHA1

      42d24e14f852afba26c793bf4063ad80f581452a

    • SHA256

      cbb6d89187847aab1fcff6b5d832ea80bca30bfe5520702133cab83335392ead

    • SHA512

      0101a9d60cfbf7dbabf5e7c3d119c12bd5774926387fb51606e5715ee80554c8311b5bc2060e4a329199a696799a593b8a7b4af9315c06a009228e3832e56f75

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

      suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    • Formbook Payload

    • Adds policy Run key to start application

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks