General

  • Target

    tmp

  • Size

    377KB

  • Sample

    221118-nxf81ahc52

  • MD5

    ac32cc059f2945493d3c4b33fffd583f

  • SHA1

    fd8557882fe16402378b4c35c92265f7d765640e

  • SHA256

    d7c2f69689d1a1e95671fefa4ee708f62d29f078443bb31259ce2100bf5c37f5

  • SHA512

    7e38d2401110251975c519cf5573a9955ae4b7df629653cac8e72753ff370c0f4dbec69941fb5b38f0f3f50b768b7474343964021286e775dff00faeaae30a86

  • SSDEEP

    6144:MEa0NSc0uW744Db5XPmUeMDxMDUPRLQ7qMw9w354kCzXy0T7lR8Fw5DjVgK6sxN6:XcuW74KbBmXe1QP3qNX7HDjRVuP

Malware Config

Extracted

Family

formbook

Campaign

henz

Decoy

IxWMb+jVsoinShuZJzk=

TPfKgQZ//oGnKr/J

EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M

KebSmiCP9p8yUw==

HAt/ljkEuqMLHOLCi53Pv8MKX9qk

CY4ogZTwJc4vSw==

WWDIx5UYUDyepntE0YIAPca3/rI=

+Pkr01Lfb2rME7bL

S5nyK0p8jS2xdwQ=

W/oqvlO57LfkLcLHnQ==

zrrwtqkTLwxulm4l8FGopw==

AqucYext8bzFbOKthIm8E6gfVkUHxKY=

OfnjeDs78+RTcz4OHRl+

XKf1wwpZR5hLLjHgmUGOpQ==

JMyhSLoJPTCwn5o9zX2d8i1+

Wk54MBsDhWSVbnIRkQ==

7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==

hH/EYxN+jC2xdwQ=

S0F4ORqDjS2xdwQ=

0o/UwXnuJ+sJp0cOHRl+

Targets

    • Target

      tmp

    • Size

      377KB

    • MD5

      ac32cc059f2945493d3c4b33fffd583f

    • SHA1

      fd8557882fe16402378b4c35c92265f7d765640e

    • SHA256

      d7c2f69689d1a1e95671fefa4ee708f62d29f078443bb31259ce2100bf5c37f5

    • SHA512

      7e38d2401110251975c519cf5573a9955ae4b7df629653cac8e72753ff370c0f4dbec69941fb5b38f0f3f50b768b7474343964021286e775dff00faeaae30a86

    • SSDEEP

      6144:MEa0NSc0uW744Db5XPmUeMDxMDUPRLQ7qMw9w354kCzXy0T7lR8Fw5DjVgK6sxN6:XcuW74KbBmXe1QP3qNX7HDjRVuP

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks