General

  • Target

    3yOWStc-67450-810A11024A95D2E36551df194.txt

  • Size

    627KB

  • Sample

    230207-2xm87sga87

  • MD5

    5048cfa7b69c932cbfa0b4c75f475c32

  • SHA1

    182c29a05b8aa7985ec9296989d0916c312bdcba

  • SHA256

    6245fd0291090847fb869aa84e8020975c91d7254b6146e7d5c1d3bb8e462816

  • SHA512

    3061b3f1c3ad14fd0cef0ab5b5f90d166635909a6c47c98345a42a98e780d1163be337d57b3440f7dec0c57614988c6cbd475332aaaa9d82553b754ff630e792

  • SSDEEP

    12288:dcaLXqFqp+tIB07RZS75XYphhj8cgVtEtpY8SN9CjeKKzd/Tdr:OaziqptGdk+8VozYZ9Cil7h

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ges9

Decoy

lolofestival.store

amzin.info

pulsahokii.xyz

bahiszirve.com

animekoe.com

kansastaxaccountant.net

howgoodisgod.online

medakaravan.xyz

pesmagazine.net

americanpopulist.info

nepalihandicraft.com

mariabakermodeling.com

cavify.top

onlinewoonboulevard.com

furniture-22830.com

ophthalmicpersonneltraining.us

yz1204.com

extrawhite.site

tomo.store

martfind.online

Targets

    • Target

      orden pdf.exe.xz

    • Size

      408KB

    • MD5

      cea94c87fe3c1306a76559d5a386dba8

    • SHA1

      be8becb10dd3d396e66e77384e640f5354def4bc

    • SHA256

      ec50cfdb5cf346d08a2c4c75715835ea1fc2ebedccc07dd80288fcf5472bdc88

    • SHA512

      9243100980a75d609b918f0fae63ad3909c7192f0290726647fefef18d839421981f4e4e91d3a336c7fd6d5aa1d9eaaca31cd1d98d682c75e37a70e1ccffc255

    • SSDEEP

      6144:mttGNYSl7foYhQmeOZTb7KXBnVDLHbx7W5dvedaVJM4E+llwbiqQRw74lOGBGFM:mtoNYSl7f3Q4ZWBVnTda0H+sPcUyIC

    Score
    3/10
    • Target

      orden pdf.exe

    • Size

      992KB

    • MD5

      567514749532f410dc6c1c2edb544218

    • SHA1

      8d343ddf387a9c8ad878e203bbcfefaeb3a1b66d

    • SHA256

      7c9d431fdecc3270f72b5345965482158292f5072e4e6a4ba188634126681e29

    • SHA512

      b2c3234ea1eafeb16c6ae9102c1fe8c6a5e4d02cd02e15d0910fe2fa5e151f2546217e73225988e3bc5dba53acb93190f4ed6ce1e500c2f08ef94e3cf98f41bc

    • SSDEEP

      24576:87Je3RHKC7+5fxxViZhPYpnSZqAEuoLI9:8sqvCASkAEuoLM

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks