Resubmissions

27-06-2022 10:31

220627-mkdfxaccg6 10

27-06-2022 10:23

220627-me6v9sadfp 10

General

  • Target

    jpkd2.exe.virus2

  • Size

    832KB

  • Sample

    220627-me6v9sadfp

  • MD5

    c502a7c74e56610c645b07d353bc68ba

  • SHA1

    a1e7fe7346d1c87fb948df2cfb5b9d6fa68de771

  • SHA256

    e26f5163ac535bab0426bde4c29b11a7194d418f7ff9e27df41d079d7d04d259

  • SHA512

    8c5feb4dd1eb68f940ce44af312726ab0892db198568d91c04cca8461740634d650a365207769091213ee4e6c7198075d36d728c8d669fb7021722eaec6c6e43

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

modischoolcbse.com

theneverwinter.com

rszkjx-vps-hosting.website

fnihil.com

1pbet.com

nnowzscorrez.com

uaotgvjl.icu

starmapsqatar.com

ekisilani.com

extradeepsheets.com

jam-nins.com

buranly.com

orixentertainment.com

rawtech.energy

myol.guru

utex.club

jiapie.com

wowig.store

wweidlyyl.com

systaskautomation.com

Targets

    • Target

      jpkd2.exe.virus2

    • Size

      832KB

    • MD5

      c502a7c74e56610c645b07d353bc68ba

    • SHA1

      a1e7fe7346d1c87fb948df2cfb5b9d6fa68de771

    • SHA256

      e26f5163ac535bab0426bde4c29b11a7194d418f7ff9e27df41d079d7d04d259

    • SHA512

      8c5feb4dd1eb68f940ce44af312726ab0892db198568d91c04cca8461740634d650a365207769091213ee4e6c7198075d36d728c8d669fb7021722eaec6c6e43

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • Formbook Payload

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks