General

  • Target

    6a726fb5c93adbae0f3061b40b19745587c0114deb86bd72c90acdd69242cbe0

  • Size

    720KB

  • Sample

    230321-l4dqcahf76

  • MD5

    e0ac8b5b2b3c5179b36a2363d60040bc

  • SHA1

    872067726afe12a29e8dc90eac037fa90150ad0c

  • SHA256

    6a726fb5c93adbae0f3061b40b19745587c0114deb86bd72c90acdd69242cbe0

  • SHA512

    6cf2e874c5c13345674a808eb71816b987a0ca08f50fb1080f74d26a3081076ee159eb9a40f6da339461305bc8c984b3b629ce4437d7a4ac0c5640cfd5fd0436

  • SSDEEP

    12288:MB171bq7pQn24yjmf0vff3kn6se2AtPFGu5Wwq5nCItvd9j:85E7pQ0yf+XlJtYu5Wwgn1d

Malware Config

Extracted

Family

formbook

Campaign

nvp4

Decoy

EiywrQNofDNveWY1IESoBA==

yqEWFGRfErX7ICQCwyQ+YeLXtaA=

Ers0rc50nbjso0jbdZTmBw==

XQxVP45+F5OZn3ZBTC7MLe1OF3G5c5uK9A==

RHh4uwtsttjzlxy+eW3+

W+xQshfnvmF5n5x2d+cEVdBNIkQRHRE=

FwlyiuXNX0+Trw==

euLn91on/7DeDe++zbQ4YeLXtaA=

td4cO8m3HDRWtl8p7Q==

ZrlyAAPqc3GXI5k=

OM0IisKOI78FJC/IuIxxAu5nRg==

d6A0QJ6PV+AOpyK+eW3+

+EgxFWUu3Ulatl8p7Q==

GC/stck1ILXn+cWZx7w8W6rPFmO6c5uK9A==

hhIiK4+CKEOfB4tr

mA1pyQ85ye8N

4xgWYcEpEoidv8eXKNncAQ==

L+hOVbe+IWyc8oVUclc=

J7EGaJ+L+wKLXUYg7w==

L5R/nfdgQdMHD+TUKw1Zo3Hb

Targets

    • Target

      6a726fb5c93adbae0f3061b40b19745587c0114deb86bd72c90acdd69242cbe0

    • Size

      720KB

    • MD5

      e0ac8b5b2b3c5179b36a2363d60040bc

    • SHA1

      872067726afe12a29e8dc90eac037fa90150ad0c

    • SHA256

      6a726fb5c93adbae0f3061b40b19745587c0114deb86bd72c90acdd69242cbe0

    • SHA512

      6cf2e874c5c13345674a808eb71816b987a0ca08f50fb1080f74d26a3081076ee159eb9a40f6da339461305bc8c984b3b629ce4437d7a4ac0c5640cfd5fd0436

    • SSDEEP

      12288:MB171bq7pQn24yjmf0vff3kn6se2AtPFGu5Wwq5nCItvd9j:85E7pQ0yf+XlJtYu5Wwgn1d

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks