General

  • Target

    1.exe

  • Size

    910KB

  • Sample

    230222-vkl22see4x

  • MD5

    07f71920ac8c2a40151de5333dc980ca

  • SHA1

    c7d05c7e1d09cb5cc9fb188bf62356a75e1320f5

  • SHA256

    f6c038dd424848be24f8d21fcead48b0f5649150173ee33e603e2eb3b77e401c

  • SHA512

    920ea1173757f7480e42e72c0a18b47acd7222295f96395d33b7c4b6ef20339fd2e78c3dcf8b94be72bc934e68eff6408c2b031489ba8df1e3b3291fe4718c2f

  • SSDEEP

    12288:cvI/SRZe0WFIQ38UWtwn/8vprceJz5Roy59N7axbIeYPG48SLuk8A1JdY5mQPmdx:cQ3SQ3XWtwn/8vB99mDk1yYQPE29K

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      1.exe

    • Size

      910KB

    • MD5

      07f71920ac8c2a40151de5333dc980ca

    • SHA1

      c7d05c7e1d09cb5cc9fb188bf62356a75e1320f5

    • SHA256

      f6c038dd424848be24f8d21fcead48b0f5649150173ee33e603e2eb3b77e401c

    • SHA512

      920ea1173757f7480e42e72c0a18b47acd7222295f96395d33b7c4b6ef20339fd2e78c3dcf8b94be72bc934e68eff6408c2b031489ba8df1e3b3291fe4718c2f

    • SSDEEP

      12288:cvI/SRZe0WFIQ38UWtwn/8vprceJz5Roy59N7axbIeYPG48SLuk8A1JdY5mQPmdx:cQ3SQ3XWtwn/8vB99mDk1yYQPE29K

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks