General

  • Target

    H3409D.exe

  • Size

    770KB

  • Sample

    230313-ng3r3aab45

  • MD5

    8173c4f1aab9e70409d795b904d1b30b

  • SHA1

    ca3a7fa60e5f910647316450c257a11aab8e7299

  • SHA256

    d69785e0fa78ddb451072e232164234057e49a7671695c33c0db64adba871e44

  • SHA512

    0815ae280189619c39bbffc0b75a93d499363c1389c2e3c98eadce769f47d775e81be2bf3d293b6c4bb9e51a41d1398f2130c93983152adc19e25918835c6cb9

  • SSDEEP

    12288:gKLJyUZiUWf0sSEpcwXybqAsespUI2PRl/NnLLm:fly1UWf0s7qwXwI1pUDZl/NnLL

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

h3sc

Decoy

seemessage.com

bitlab.website

cheesestuff.ru

bhartiyafitness.com

bardapps.com

l7a4.com

chiara-samatanga.com

lesrollintioup.com

dropwc.com

mackey242.com

rackksfresheggs.com

thinkvlog.com

aidmedicalassist.com

firehousepickleball.net

sifreyonetici.com

teka-mart.com

ddttzone.xyz

macfeeupdate.com

ivocastillo.com

serjayparks.com

Targets

    • Target

      H3409D.exe

    • Size

      770KB

    • MD5

      8173c4f1aab9e70409d795b904d1b30b

    • SHA1

      ca3a7fa60e5f910647316450c257a11aab8e7299

    • SHA256

      d69785e0fa78ddb451072e232164234057e49a7671695c33c0db64adba871e44

    • SHA512

      0815ae280189619c39bbffc0b75a93d499363c1389c2e3c98eadce769f47d775e81be2bf3d293b6c4bb9e51a41d1398f2130c93983152adc19e25918835c6cb9

    • SSDEEP

      12288:gKLJyUZiUWf0sSEpcwXybqAsespUI2PRl/NnLLm:fly1UWf0s7qwXwI1pUDZl/NnLL

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks