General

  • Target

    28095361.exe

  • Size

    445KB

  • Sample

    221208-ywjmvaec4z

  • MD5

    eb177fb227c18d784c930896b96223a4

  • SHA1

    9b70ef7c4fb0c47a8a81e5b479cc21ddec5874b2

  • SHA256

    6df68164866d5b1b6ac0f188ccfb12bceee5c013c411cacc8212ade1807015ad

  • SHA512

    857e12e274d05645c0b94db4c915321dc72699a4f7ad611d348b6117aa45409cc8df1508f9e6808f64ed4e03d9f2a4fac7ef4ef8299af12c1e5722c1e0d90472

  • SSDEEP

    12288:XNF12FRDkeuvdh6vX2UoJLtZAxSoklfwBX3wVDszvBUU:XNF12PIfdh6vX2tJKSokGwu

Malware Config

Extracted

Family

formbook

Campaign

yurm

Decoy

X06d1tis1GUX/R0g87Ud

BKiZ33D1P766GVXO1ZwV

lAFdjB7CSxGX8Trz

Gc7dWizTVxWX8Trz

tDkr9JAfi1OHAW1PGOageIp4

bCpMtHKU3mVp8BY5sQ==

7WKpsMWt8nsrhJClJeOZNg==

0A9KTlETQ86Cmd8k0o5NP5RwCg==

aJ61paNJztSp42c=

CrgoA8ySIOsytCbO1ZwV

i46SnHYDD9tTIHI=

XFRCRCjtFZeU3x4Rn3xfD5BnPz+RDA==

c4CZghuHvzW9A31gEz0d

QAjzz9qyRRWBNYseAI4M

Jpbmu4A1YvBvN3ruZgiRmJA5BCFd

PfoFXGNFhhuX8Trz

bqCfk0m8ApAl+Tm1Ms5Tb23IT7tS

z7INff7HNALxc5HWq2/ftrVR6A7R1zvTUQ==

m7IShV4LSFxbqxhrVsZ1Ig==

BHRp7q0gtoRuqBRnVsZ1Ig==

Targets

    • Target

      28095361.exe

    • Size

      445KB

    • MD5

      eb177fb227c18d784c930896b96223a4

    • SHA1

      9b70ef7c4fb0c47a8a81e5b479cc21ddec5874b2

    • SHA256

      6df68164866d5b1b6ac0f188ccfb12bceee5c013c411cacc8212ade1807015ad

    • SHA512

      857e12e274d05645c0b94db4c915321dc72699a4f7ad611d348b6117aa45409cc8df1508f9e6808f64ed4e03d9f2a4fac7ef4ef8299af12c1e5722c1e0d90472

    • SSDEEP

      12288:XNF12FRDkeuvdh6vX2UoJLtZAxSoklfwBX3wVDszvBUU:XNF12PIfdh6vX2tJKSokGwu

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks