General

  • Target

    Attached Proforma Invoice.exe

  • Size

    678KB

  • Sample

    230203-vb9fzsbf6s

  • MD5

    9f0e000d75cf201d56f68e51a0c43cc5

  • SHA1

    54d6592876e9261109fbd60ae2e078f475f74f1e

  • SHA256

    02033ee5f18dc5c14cca3e808111693ff1b41d8d705268ae55e86251fe6bcc8b

  • SHA512

    fe72606ae529ef5522b7681b66118c516c6f3ea55844441196f1143ab684dba5daee89dfcdf957b291a16ee862d575accdfe1b45837d4ac01645da894492f64e

  • SSDEEP

    12288:+J8P4O2utBLvuQ4ZNn1AjnJzQFftOZCcgy:mIWutBLm/NnoJzQFW

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

wise-transfer.info

jam-nins.com

thebestsocialcrm.com

majomeow222.com

ancientshadowguilt.space

gentleman-china.com

parquemermoz.store

taxuw.com

sharqiyapaints.com

libraryofkath.com

1949wan.com

synqr.net

bitchessgirls.com

btonu.cfd

coding-bootcamps-16314.com

leadership22-tdh.site

maximsboutique.com

irishsummertruffles.com

sdnaqianchuan.com

uyews.xyz

Targets

    • Target

      Attached Proforma Invoice.exe

    • Size

      678KB

    • MD5

      9f0e000d75cf201d56f68e51a0c43cc5

    • SHA1

      54d6592876e9261109fbd60ae2e078f475f74f1e

    • SHA256

      02033ee5f18dc5c14cca3e808111693ff1b41d8d705268ae55e86251fe6bcc8b

    • SHA512

      fe72606ae529ef5522b7681b66118c516c6f3ea55844441196f1143ab684dba5daee89dfcdf957b291a16ee862d575accdfe1b45837d4ac01645da894492f64e

    • SSDEEP

      12288:+J8P4O2utBLvuQ4ZNn1AjnJzQFftOZCcgy:mIWutBLm/NnoJzQFW

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks