General

  • Target

    09d33a238b3df184efc44eeafad7f018aec68352

  • Size

    928KB

  • Sample

    221007-b346ssbebr

  • MD5

    3306c4b702649fdb2191b8b2bb618181

  • SHA1

    09d33a238b3df184efc44eeafad7f018aec68352

  • SHA256

    24ade2d03f27008a806253ce6d5f92e08f49046c759b13881805d8f5605a1f8a

  • SHA512

    794939d98def6c81bcd4e9ff5e8156e56c722b26cdd0f462f5ec3e2dbc1c49105586dca3997d80dd8f390b09ef8c8f08925d96e033607b28b5a775c2ad541343

  • SSDEEP

    24576:+Xgr/BEuCNYeA06CG7Dmo/KvouloQHO2XeLoPx1lGe:+XmSLMKfOLoJ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      09d33a238b3df184efc44eeafad7f018aec68352

    • Size

      928KB

    • MD5

      3306c4b702649fdb2191b8b2bb618181

    • SHA1

      09d33a238b3df184efc44eeafad7f018aec68352

    • SHA256

      24ade2d03f27008a806253ce6d5f92e08f49046c759b13881805d8f5605a1f8a

    • SHA512

      794939d98def6c81bcd4e9ff5e8156e56c722b26cdd0f462f5ec3e2dbc1c49105586dca3997d80dd8f390b09ef8c8f08925d96e033607b28b5a775c2ad541343

    • SSDEEP

      24576:+Xgr/BEuCNYeA06CG7Dmo/KvouloQHO2XeLoPx1lGe:+XmSLMKfOLoJ

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks