General

  • Target

    DHL Invoice JEDR001193478.xls

  • Size

    1.3MB

  • Sample

    230328-g15mfahc86

  • MD5

    fda7cc3767b509751d3c14700c9bbf66

  • SHA1

    3f2a9ae3c98ab30f27a37e6515de4475471812f9

  • SHA256

    dc81b5b7a452a87fb69375b84afaeebd797411b314f5c8422dfa0d180226b354

  • SHA512

    b7476ae3fb8072cf33b2a0686febec558e5b40794c5a8d1462f6cefbacafd6170a177299840b2e02e1ae349ff068191c286333ddeb2ddac659d0c66ac2a5a7b2

  • SSDEEP

    24576:ILKWSSMMednEhakAmmjmCakAmmjmt+MXUjakAmmjmT+MXUYP+222222222222228:ILKaMCaaoxaaoa+MXoaao4+MXC01tc

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ar73

Decoy

classgorilla.com

b6817.com

1wwuwa.top

dgslimited.africa

deepwaterships.com

hkshshoptw.shop

hurricanevalleyatvjamboree.com

ckpconsulting.com

laojiangmath.com

authenticityhacking.com

family-doctor-53205.com

investinstgeorgeut.com

lithoearthsolution.africa

quickhealcareltd.co.uk

delightkgrillw.top

freezeclosettoilet.com

coo1star.com

gemgamut.com

enrichednetworksolutions.com

betterbeeclean.com

Targets

    • Target

      DHL Invoice JEDR001193478.xls

    • Size

      1.3MB

    • MD5

      fda7cc3767b509751d3c14700c9bbf66

    • SHA1

      3f2a9ae3c98ab30f27a37e6515de4475471812f9

    • SHA256

      dc81b5b7a452a87fb69375b84afaeebd797411b314f5c8422dfa0d180226b354

    • SHA512

      b7476ae3fb8072cf33b2a0686febec558e5b40794c5a8d1462f6cefbacafd6170a177299840b2e02e1ae349ff068191c286333ddeb2ddac659d0c66ac2a5a7b2

    • SSDEEP

      24576:ILKWSSMMednEhakAmmjmCakAmmjmt+MXUjakAmmjmT+MXUYP+222222222222228:ILKaMCaaoxaaoa+MXoaao4+MXC01tc

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Tasks