General

  • Target

    SecuriteInfo.com.Win32.Malware-gen.5701.3804

  • Size

    767KB

  • Sample

    221123-mmg7waed94

  • MD5

    ceadb6ba9affc991bf727f0ea211a6bc

  • SHA1

    6b01562026b36b93ea1fe13a13baa70114795da2

  • SHA256

    23473106e8e2e1add3756ee0e4101095710b9663791f57e026e08f99218077ff

  • SHA512

    c6ac1817afa04ae1d36516037525333f5cbab879f8f2cd460a05a96e3211346a164c195bf2d674ea940c1038655241a3e73b6847fbb17c6d4dec0f24e8d247eb

  • SSDEEP

    12288:iOrAkZrlpZxc3NKqgw9ONuRJoo5YqTdTB2O4rwSMpxwhx2g:is3hp4c6/aq5oOqLM2xJ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21821&authkey=AM_sm-3HDCFDLks

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      SecuriteInfo.com.Win32.Malware-gen.5701.3804

    • Size

      767KB

    • MD5

      ceadb6ba9affc991bf727f0ea211a6bc

    • SHA1

      6b01562026b36b93ea1fe13a13baa70114795da2

    • SHA256

      23473106e8e2e1add3756ee0e4101095710b9663791f57e026e08f99218077ff

    • SHA512

      c6ac1817afa04ae1d36516037525333f5cbab879f8f2cd460a05a96e3211346a164c195bf2d674ea940c1038655241a3e73b6847fbb17c6d4dec0f24e8d247eb

    • SSDEEP

      12288:iOrAkZrlpZxc3NKqgw9ONuRJoo5YqTdTB2O4rwSMpxwhx2g:is3hp4c6/aq5oOqLM2xJ

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks