General

  • Target

    SecuriteInfo.com.Trojan.Siggen18.49748.12689.11865.exe

  • Size

    1.1MB

  • Sample

    220922-vknwmsfgbp

  • MD5

    6f9cb27e4c65c1ce5c1d1bb3aab52d1c

  • SHA1

    3d1dfaab9acbe7c80830ba29334d90a1616af3ab

  • SHA256

    6d68db4d0aa5bfc75ed6eb34a3680abb7ee99af0138419324e65749af1ba4b40

  • SHA512

    30070ed8be62ca01a59196d8ea82b1bdc31e591ef6f7a19a98ead9e3c4528c0b846e6319392fc20f8190ff3d35791990ac7f0c27f2362dece7cbd7fbb61d3d95

  • SSDEEP

    24576:2V8t1SaLGaE27cMQimshpzuFtqMoXwbPfQ9W8AoqiVNW:2+tycyeMms

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t3c9

Decoy

shadeshmarriagemedia.com

e-russ.com

sofiashome.com

theworriedwell.com

americantechfront.com

seasonssparkling.com

maximuscanada.net

tifin-private-markets.com

amecc2.net

xuexi22.icu

injectiontek.com

enrrocastoneimports.com

marvelouslightcandleco.com

eaamedia.com

pmediaerp.com

tikivips111.com

chesterfieldcleaningcare.com

thecrowdedtablemusic.com

duncanvillepanthers.com

floriculturajoinville.xyz

Targets

    • Target

      SecuriteInfo.com.Trojan.Siggen18.49748.12689.11865.exe

    • Size

      1.1MB

    • MD5

      6f9cb27e4c65c1ce5c1d1bb3aab52d1c

    • SHA1

      3d1dfaab9acbe7c80830ba29334d90a1616af3ab

    • SHA256

      6d68db4d0aa5bfc75ed6eb34a3680abb7ee99af0138419324e65749af1ba4b40

    • SHA512

      30070ed8be62ca01a59196d8ea82b1bdc31e591ef6f7a19a98ead9e3c4528c0b846e6319392fc20f8190ff3d35791990ac7f0c27f2362dece7cbd7fbb61d3d95

    • SSDEEP

      24576:2V8t1SaLGaE27cMQimshpzuFtqMoXwbPfQ9W8AoqiVNW:2+tycyeMms

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks