General

  • Target

    5531f1b0a51ec002f27b542b5921ced6.xls

  • Size

    1.1MB

  • Sample

    230110-kzfhpsfe48

  • MD5

    5531f1b0a51ec002f27b542b5921ced6

  • SHA1

    95ec17fd36b85a3635384e1bb6e9f61d8f878657

  • SHA256

    fc73ecd3478a064482d3627a82e6296b87e8475d2cdba000ded33ce1025110b6

  • SHA512

    7888b4c061e2450a4592b021182007fc5f32170f6e53d27197e4c28e24ccfe97e0b9839ad5346ccad3411ac2ad44f38cb8dd2e18836bb44763fcebd2e565d6e7

  • SSDEEP

    24576:qZyper9XXXXXXXDXXXXUXXXXXXXXXXXXXXXXHmym929XkJ+7VkJ08ZoaUF:0q4c7Vq9FU

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      5531f1b0a51ec002f27b542b5921ced6.xls

    • Size

      1.1MB

    • MD5

      5531f1b0a51ec002f27b542b5921ced6

    • SHA1

      95ec17fd36b85a3635384e1bb6e9f61d8f878657

    • SHA256

      fc73ecd3478a064482d3627a82e6296b87e8475d2cdba000ded33ce1025110b6

    • SHA512

      7888b4c061e2450a4592b021182007fc5f32170f6e53d27197e4c28e24ccfe97e0b9839ad5346ccad3411ac2ad44f38cb8dd2e18836bb44763fcebd2e565d6e7

    • SSDEEP

      24576:qZyper9XXXXXXXDXXXXUXXXXXXXXXXXXXXXXHmym929XkJ+7VkJ08ZoaUF:0q4c7Vq9FU

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks