Resubmissions

14-09-2022 03:42

220914-d9hbqadabk 10

14-09-2022 03:35

220914-d5qsashbh2 7

14-09-2022 03:06

220914-dlxrhahbe5 4

General

  • Target

    Shipping Documents&Inv.xlsx

  • Size

    100KB

  • Sample

    220914-d9hbqadabk

  • MD5

    1da456f925ab2886a211a11c5aa7bf7e

  • SHA1

    f501d932f368fe6c481775303411526d15ded79d

  • SHA256

    87a097b21885bcece19b57b7110065316acd4082a3bbaa0930e4b74d9546ef5d

  • SHA512

    e177225a27c04c6736159ef050efbe62bf51163b2e3318cb632472d2393e71190277cd5cae8681fc0a34d63bd66f981d665e0abb385b04c99547a59d66434816

  • SSDEEP

    1536:eN2BfocsYqKZ5onDxU9k3Gfh0SZTaJF1U3UsYJrdMBGfXk0nrY2sd8VH8N34S31r:ecBfocszKKMdiKa2E/rFfXNsd8VdSlr

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cy35

Decoy

anfomakina.com

samruddhabhartfoundation.info

luxgems.store

tencstudios.com

prosperitycpr.life

fauxroofingproducts.com

adjoinsquirm.sbs

zjdingfeng.net

ellaboratorio.xyz

cobalt.church

dqjintuo.com

radiocontinu.com

sdelajtort.store

wypr.xyz

invisiblegoliath.com

keywordbranding.com

blackopsconcrete.online

17wow.life

fontaneriajccaballero.com

huseyinyarici.xyz

Targets

    • Target

      Shipping Documents&Inv.xlsx

    • Size

      100KB

    • MD5

      1da456f925ab2886a211a11c5aa7bf7e

    • SHA1

      f501d932f368fe6c481775303411526d15ded79d

    • SHA256

      87a097b21885bcece19b57b7110065316acd4082a3bbaa0930e4b74d9546ef5d

    • SHA512

      e177225a27c04c6736159ef050efbe62bf51163b2e3318cb632472d2393e71190277cd5cae8681fc0a34d63bd66f981d665e0abb385b04c99547a59d66434816

    • SSDEEP

      1536:eN2BfocsYqKZ5onDxU9k3Gfh0SZTaJF1U3UsYJrdMBGfXk0nrY2sd8VH8N34S31r:ecBfocszKKMdiKa2E/rFfXNsd8VdSlr

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks