General

  • Target

    SecuriteInfo.com.Trojan.DOC.Exploit.S.26451.27250.rtf

  • Size

    1.8MB

  • Sample

    221218-t2368aff9t

  • MD5

    189183f0fcb3ddca384604d88a6f15ae

  • SHA1

    19b710e99726b7d70b3ad407389d1efe0f6841f4

  • SHA256

    264f0534cab513547b16dd6089b22b8e87079d403159ba4550dc22c1c5ba4311

  • SHA512

    ae138592369fc7c565f5349b542213417c8c6143e5227dd91561a6372bc34b1de8cc62a4e4b6a388ac9e81c6a8ebbd3076bc73863a496a837d3706baa891558f

  • SSDEEP

    1536:XsdRLURHtQQQQQQQQQK3QQuQZbJt9Xp9EiQZIgdRXqgZbJt9Xp9EiQQQ9QkQQQZC:XY3K

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kk2u

Decoy

ea2production.com

attentionasset.guru

buildwithnikki.com

imtheonlyperson.team

virtualexpotech.com

calsury.com

kleanrituals.net

liburaja.com

liqzxixcya.net

wmtk8.com

jillianmacklin.com

coffeewithme.com

xn--l-1fa.online

worktoolsdepot.com

collectprocessstore.com

mu-thienmenh.com

brooklynrashael.com

chsepd.com

hudsonsealswim.com

basslakedisposal.com

Targets

    • Target

      SecuriteInfo.com.Trojan.DOC.Exploit.S.26451.27250.rtf

    • Size

      1.8MB

    • MD5

      189183f0fcb3ddca384604d88a6f15ae

    • SHA1

      19b710e99726b7d70b3ad407389d1efe0f6841f4

    • SHA256

      264f0534cab513547b16dd6089b22b8e87079d403159ba4550dc22c1c5ba4311

    • SHA512

      ae138592369fc7c565f5349b542213417c8c6143e5227dd91561a6372bc34b1de8cc62a4e4b6a388ac9e81c6a8ebbd3076bc73863a496a837d3706baa891558f

    • SSDEEP

      1536:XsdRLURHtQQQQQQQQQK3QQuQZbJt9Xp9EiQZIgdRXqgZbJt9Xp9EiQQQ9QkQQQZC:XY3K

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Formbook payload

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks