General

  • Target

    1366af1721921e597d55c96ff1cc49dd0253869147f7dd6623ad2440ca5162d0

  • Size

    448KB

  • Sample

    220616-24pqlshefk

  • MD5

    30524a348e38eb991ddec856c6730cb1

  • SHA1

    227255133555186de301a9c703203948aba45df0

  • SHA256

    1366af1721921e597d55c96ff1cc49dd0253869147f7dd6623ad2440ca5162d0

  • SHA512

    547b64cb54db7b00e2f8552b480aff59782e5272e513a76266fa5517154b359050f07e6d1b1018bd81e0632ce3e740ae1c0b75596eefe97f2d2068e2f3a005f6

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

s3s3

Decoy

tvielotus.com

teesta.xyz

talentrecruitor.com

pamaungipb.com

xn--90ahkh6a6b8b.site

910carolina.com

toyotaecoyouth-dev.com

invetnables.com

gdexc.com

ssw168.com

householdmould.com

mqttradar.xyz

t333c.com

thepausestudio.com

evershedsutherlands.com

asbdataplus.com

preddylilthingz.com

jepwu.com

tvlido.com

artovus.com

Targets

    • Target

      1366af1721921e597d55c96ff1cc49dd0253869147f7dd6623ad2440ca5162d0

    • Size

      448KB

    • MD5

      30524a348e38eb991ddec856c6730cb1

    • SHA1

      227255133555186de301a9c703203948aba45df0

    • SHA256

      1366af1721921e597d55c96ff1cc49dd0253869147f7dd6623ad2440ca5162d0

    • SHA512

      547b64cb54db7b00e2f8552b480aff59782e5272e513a76266fa5517154b359050f07e6d1b1018bd81e0632ce3e740ae1c0b75596eefe97f2d2068e2f3a005f6

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Formbook Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks