General

  • Target

    1697-1698-1699pdf.exe

  • Size

    777KB

  • Sample

    221205-mebp5aec4x

  • MD5

    63fb0d73ce132e447e79657823b6b460

  • SHA1

    3a69072ca5bddb9c7ae53f440a9657e06facb6a5

  • SHA256

    494e56903190304bab1c27786bd1f60aeaede9b478b2bca17474602414b82688

  • SHA512

    2bb76a1e9420e32df02c448dea281d05c8c67e4e48051f513cb68053453f9fdbd4d8c90aa3e25e54b1a45b1aad726ce79213c11a67690a1ae38c1b555ab704a3

  • SSDEEP

    12288:4aDW4pT3boLduwYh0H7/C+khXx7ogdmTOeIurz7MJUXbXzaHyCkonBVyrj:4ajVsLduwA0HLC+k7MgdmTRrl/ronBM

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      1697-1698-1699pdf.exe

    • Size

      777KB

    • MD5

      63fb0d73ce132e447e79657823b6b460

    • SHA1

      3a69072ca5bddb9c7ae53f440a9657e06facb6a5

    • SHA256

      494e56903190304bab1c27786bd1f60aeaede9b478b2bca17474602414b82688

    • SHA512

      2bb76a1e9420e32df02c448dea281d05c8c67e4e48051f513cb68053453f9fdbd4d8c90aa3e25e54b1a45b1aad726ce79213c11a67690a1ae38c1b555ab704a3

    • SSDEEP

      12288:4aDW4pT3boLduwYh0H7/C+khXx7ogdmTOeIurz7MJUXbXzaHyCkonBVyrj:4ajVsLduwA0HLC+k7MgdmTRrl/ronBM

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks