General

  • Target

    popis proizvoda pdf.exe

  • Size

    803KB

  • Sample

    230329-kl1lqahb6t

  • MD5

    89b30867a6cd23750808aedd3ff9c6e4

  • SHA1

    13da166de5edf4fed95c87f3046097fd33e17d90

  • SHA256

    aee5d1b7326545ff692b98743e04d035e01415300fea8a5bf445d3490d6776cc

  • SHA512

    8a90650c70b6e24dfad262df0f7a1a8a68886d3fbdd2afd1e027911d0ee3fdb7b1e4184b18e5bb8ca8de4427c31bf467300e64dad8fd6d5964808e9e8c749ef3

  • SSDEEP

    12288:x2swnFTt7oRDoKgphGvVgKRZ1Eb6IZ1nszTgAJ+fMZq643VaxBP8:x2hVoUphGtgKREbpZ1CEAJ+fquS

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      popis proizvoda pdf.exe

    • Size

      803KB

    • MD5

      89b30867a6cd23750808aedd3ff9c6e4

    • SHA1

      13da166de5edf4fed95c87f3046097fd33e17d90

    • SHA256

      aee5d1b7326545ff692b98743e04d035e01415300fea8a5bf445d3490d6776cc

    • SHA512

      8a90650c70b6e24dfad262df0f7a1a8a68886d3fbdd2afd1e027911d0ee3fdb7b1e4184b18e5bb8ca8de4427c31bf467300e64dad8fd6d5964808e9e8c749ef3

    • SSDEEP

      12288:x2swnFTt7oRDoKgphGvVgKRZ1Eb6IZ1nszTgAJ+fMZq643VaxBP8:x2hVoUphGtgKREbpZ1CEAJ+fquS

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks