General

  • Target

    Quotation.xls

  • Size

    1MB

  • Sample

    230328-g141xahc82

  • MD5

    ab0df80e16d2c47d924bd9ad36eb7937

  • SHA1

    808180d3a7248c813f457c32e1077341cbf527d3

  • SHA256

    4b77057686ba3b9c261ba85440fe0a66905ca7bfff9d10ec57c80c93415d9554

  • SHA512

    8da103a460100cce6470bee05560be261b14952cf017e845968749b5a52df801f58b49843e0a696813dded048f9b05c8a2c5e02db2e725e32786dcb7ce95db3a

  • SSDEEP

    24576:LLKQSSMMednEyakAmmjm6+MXUTakAmmjmmbfuc2222222222222222222222a2rh:LLKkMpaaoN+MX8aaosA1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2fg

Decoy

snowcrash.website

pointman.us

newheartvalve.care

drandl.com

sandspringsramblers.com

programagubernamental.online

boja.us

mvrsnike.com

mentallyillmotherhood.com

facom.us

programagubernamental.store

izivente.com

roller-v.fr

amazonbioactives.com

metaverseapple.xyz

5gt-mobilevsverizon.com

gtwebsolutions.co

scottdunn.life

usdp.trade

pikmin.run

Targets

    • Target

      Quotation.xls

    • Size

      1MB

    • MD5

      ab0df80e16d2c47d924bd9ad36eb7937

    • SHA1

      808180d3a7248c813f457c32e1077341cbf527d3

    • SHA256

      4b77057686ba3b9c261ba85440fe0a66905ca7bfff9d10ec57c80c93415d9554

    • SHA512

      8da103a460100cce6470bee05560be261b14952cf017e845968749b5a52df801f58b49843e0a696813dded048f9b05c8a2c5e02db2e725e32786dcb7ce95db3a

    • SSDEEP

      24576:LLKQSSMMednEyakAmmjm6+MXUTakAmmjmmbfuc2222222222222222222222a2rh:LLKkMpaaoN+MX8aaosA1

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Tasks