General

  • Target

    55afd010952d064dd2b07e044cef6c3acf4d65bade87549121c5d9835dca616b.exe

  • Size

    762KB

  • Sample

    220811-q4byzafhhj

  • MD5

    8b6a43a36aeb24dd75517f7c666cbc8a

  • SHA1

    1904f548cc2b45d10d1079a8de71050d82575fa0

  • SHA256

    55afd010952d064dd2b07e044cef6c3acf4d65bade87549121c5d9835dca616b

  • SHA512

    9baf13f0fbd1b7764fcdf3398b3075224aad00e7b7c6207f07697f0a3999affb1c722f686000ea7d6271dddd825fd57f1e6aa98e472185c1a3ccc94271bce8d9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t3c9

Decoy

shadeshmarriagemedia.com

e-russ.com

sofiashome.com

theworriedwell.com

americantechfront.com

seasonssparkling.com

maximuscanada.net

tifin-private-markets.com

amecc2.net

xuexi22.icu

injectiontek.com

enrrocastoneimports.com

marvelouslightcandleco.com

eaamedia.com

pmediaerp.com

tikivips111.com

chesterfieldcleaningcare.com

thecrowdedtablemusic.com

duncanvillepanthers.com

floriculturajoinville.xyz

Targets

    • Target

      55afd010952d064dd2b07e044cef6c3acf4d65bade87549121c5d9835dca616b.exe

    • Size

      762KB

    • MD5

      8b6a43a36aeb24dd75517f7c666cbc8a

    • SHA1

      1904f548cc2b45d10d1079a8de71050d82575fa0

    • SHA256

      55afd010952d064dd2b07e044cef6c3acf4d65bade87549121c5d9835dca616b

    • SHA512

      9baf13f0fbd1b7764fcdf3398b3075224aad00e7b7c6207f07697f0a3999affb1c722f686000ea7d6271dddd825fd57f1e6aa98e472185c1a3ccc94271bce8d9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks