General

  • Target

    SecuriteInfo.com.Variant.Zusy.438336.24504.4278.exe

  • Size

    1003KB

  • Sample

    220923-qbhk2sgge4

  • MD5

    df27b3aae2b3c9e776e2c18c79da59a4

  • SHA1

    da4fee8e2f089106730da0099851c20f1ef40b02

  • SHA256

    ac5e5935c877d48be14314d53a7154e370426a35168c82cb9ee83b7e98d02f28

  • SHA512

    4e49f575a0140d9b92463a3c4a9c78ce6a874112cb800004755184c8338f06ba558b852ffbce422b64618a463de06cb7bf1e82f855fbc181370fe37e9e93accb

  • SSDEEP

    24576:ykb0afaPqkuuvxYe6aUMdXs+loXwbPfQ9W8AoqiVNW:yk4Ku5YhMVs+lms

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t3c9

Decoy

shadeshmarriagemedia.com

e-russ.com

sofiashome.com

theworriedwell.com

americantechfront.com

seasonssparkling.com

maximuscanada.net

tifin-private-markets.com

amecc2.net

xuexi22.icu

injectiontek.com

enrrocastoneimports.com

marvelouslightcandleco.com

eaamedia.com

pmediaerp.com

tikivips111.com

chesterfieldcleaningcare.com

thecrowdedtablemusic.com

duncanvillepanthers.com

floriculturajoinville.xyz

Targets

    • Target

      SecuriteInfo.com.Variant.Zusy.438336.24504.4278.exe

    • Size

      1003KB

    • MD5

      df27b3aae2b3c9e776e2c18c79da59a4

    • SHA1

      da4fee8e2f089106730da0099851c20f1ef40b02

    • SHA256

      ac5e5935c877d48be14314d53a7154e370426a35168c82cb9ee83b7e98d02f28

    • SHA512

      4e49f575a0140d9b92463a3c4a9c78ce6a874112cb800004755184c8338f06ba558b852ffbce422b64618a463de06cb7bf1e82f855fbc181370fe37e9e93accb

    • SSDEEP

      24576:ykb0afaPqkuuvxYe6aUMdXs+loXwbPfQ9W8AoqiVNW:yk4Ku5YhMVs+lms

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks