Resubmissions

27-11-2022 14:10

221127-rgyd5ach69 10

27-11-2022 14:05

221127-rdtlrscf74 10

General

  • Target

    tmp

  • Size

    687KB

  • Sample

    221127-rgyd5ach69

  • MD5

    008ed0d43ba5e29f6860d858937c7348

  • SHA1

    ca71f194d0564f1cba0225ece8f01fffbad1d033

  • SHA256

    212604b13ca215693db01f642c18e800aeb394f53d1f559b939b39fae9708d87

  • SHA512

    1dfcb3e8f75ed5dc4b49f5b73d120cb053ad0ecdc9629649e8d28443199ad1a8f9df6f873fbc9c599e8de7eee9967fb64fe67f617bef5ceb8096f2016adfbbe9

  • SSDEEP

    12288:FppExTVbKc8QTCOsuiHaOCr/+TYC+NUU+gcpCYrN:FpcbWQ/suZOCryMWUDICQ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      tmp

    • Size

      687KB

    • MD5

      008ed0d43ba5e29f6860d858937c7348

    • SHA1

      ca71f194d0564f1cba0225ece8f01fffbad1d033

    • SHA256

      212604b13ca215693db01f642c18e800aeb394f53d1f559b939b39fae9708d87

    • SHA512

      1dfcb3e8f75ed5dc4b49f5b73d120cb053ad0ecdc9629649e8d28443199ad1a8f9df6f873fbc9c599e8de7eee9967fb64fe67f617bef5ceb8096f2016adfbbe9

    • SSDEEP

      12288:FppExTVbKc8QTCOsuiHaOCr/+TYC+NUU+gcpCYrN:FpcbWQ/suZOCryMWUDICQ

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

4
T1082

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks