General

  • Target

    MV ARM TBN - VESSEL PARTICULARS.exe

  • Size

    247KB

  • Sample

    221123-sdwa2abb23

  • MD5

    6d0fd8a2f7410163581e6013d06336bf

  • SHA1

    28a2160869dce2cb8623877c6beafa82f019fe37

  • SHA256

    3ab9378862ed7e3a174d4b022ed8b38eb0838d24ea2b6543be055552633e50b9

  • SHA512

    636bbc44ac34ebe539c9b269d3ef285b99c9da1a47ba8a188da8c848c6f5473f58ec4689bd76cba09eee46104b1e3e323a876c01b392b0ec9ebc7e37a3138853

  • SSDEEP

    6144:UYMY+RpZxFZ8Es0cDemuioWg4Dh9KUax4UK3se6Yt+vp57aXrQKBwH:yosUlN36EqkJ8

Malware Config

Extracted

Family

formbook

Campaign

ermr

Decoy

ErOK6LFCgNIAlQmH54oaYOL/CN29Z78=

qNSdDhu/PT/1fgafDagiCSZH1SY=

wLpPOAkYS8EABl3pHGc4hNT/Q1sHBrU=

jSxRvptHkeTGl7PT0SEmaZmjqzanuA==

b91oL+2wCcpyhnd6yvF6Pg==

mr81yp1/qqZX

hy7Xsz/PU/LWHMcGL4UYJx9n3A==

KlwrHt1gouPaXaWhoQ==

ng8M320IRJL9Ptw=

8GQbOXuaWxvKnNM=

XndOL7E5sNpVUNty4d/a

rryPBBC8PybYb+2h2MF3FHGL

kEoeyERSVCYO0g==

5/P+SBDby5hO

1fYXc30/h9W7iO17

34X+YKR+wRFE

8ir/X2MlVByh5lQ1ow8=

u9ikm2UMZ7J7hpCYow==

FLI+c3clp1BNDjVAfvC2Dnw=

t21Erq8/r09wAzAJTAH3Ng==

Targets

    • Target

      MV ARM TBN - VESSEL PARTICULARS.exe

    • Size

      247KB

    • MD5

      6d0fd8a2f7410163581e6013d06336bf

    • SHA1

      28a2160869dce2cb8623877c6beafa82f019fe37

    • SHA256

      3ab9378862ed7e3a174d4b022ed8b38eb0838d24ea2b6543be055552633e50b9

    • SHA512

      636bbc44ac34ebe539c9b269d3ef285b99c9da1a47ba8a188da8c848c6f5473f58ec4689bd76cba09eee46104b1e3e323a876c01b392b0ec9ebc7e37a3138853

    • SSDEEP

      6144:UYMY+RpZxFZ8Es0cDemuioWg4Dh9KUax4UK3se6Yt+vp57aXrQKBwH:yosUlN36EqkJ8

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks