General

  • Target

    12c87026c144f87df2338e40f2293b19.bin

  • Size

    1021KB

  • Sample

    230310-bgbblacg61

  • MD5

    d6582b7af79faee1320bbea9d96900ae

  • SHA1

    99461daa5d2c78d0f42ac1ce25f3d8819cb28623

  • SHA256

    05eeec0a0a58bada9141dfac90dccc31cd24d7919fc6f729647dfd35629cc5f8

  • SHA512

    2ff8e62121e5fba9f266196f952bbd6392711b7ec7710029f3472e9a171692520cbce18b86309f0057ffb93a3e593c0442e8ffb1f4104ac2047f85d3f3c5ff87

  • SSDEEP

    24576:1y0uMaFyKncOZZ3cP2Rs1KsmhCoOf5+qhVFoTod:1yHM++Or38VKQDR+OoTU

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      2678ea9a98659545592b7982a17a1b65b92f0fba7eea9d15760f2dbcb7546956.xls

    • Size

      1.2MB

    • MD5

      12c87026c144f87df2338e40f2293b19

    • SHA1

      b8caf6a6c738f7050523381c4e7fcbba08ec6433

    • SHA256

      2678ea9a98659545592b7982a17a1b65b92f0fba7eea9d15760f2dbcb7546956

    • SHA512

      b7ea848f6140b81ca8f1a7d9b8f6f6710f709f5289a3bfe707de04416b8b155b6d3afcd3c7d8ce7774903842bbd94a112481d9a3e8bd83b17b1e7616ae2e288c

    • SSDEEP

      24576:QLKrBwtHlx7WQmmav30xJB48tHlxGWQmmav30xF6FIW60z0tUo4QcZRx:QLKro7aQmmQ30D2S77QmmQ30H6Q+Qif

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Tasks