General

  • Target

    Deposit g.exe

  • Size

    929KB

  • Sample

    230712-j944dade9t

  • MD5

    9e8d9ab3894d103439345412327c1440

  • SHA1

    bf2afcd8f8db5f3d14621449a5c75ba347adcca3

  • SHA256

    9a36bb988eb1f8bc83089fc9b406e8fc95ad96c6ef8466b497ec3b34220f6ef3

  • SHA512

    d9131bdec04ddf1bb6f472510256c40c3197cf0636e7f4f14859aeb795ce8b25b2f016e02bc1fd99d7b596580984aee63f4e88bf6662649b702219f9639c04d6

  • SSDEEP

    24576:6P5w2x86hvebmPEDagcDhxxxTPouoQHpOLCAVxs:6P5w2x3vf8DaguLgulHpMCAHs

Malware Config

Extracted

Family

formbook

Campaign

nvp4

Decoy

EiywrQNofDNveWY1IESoBA==

yqEWFGRfErX7ICQCwyQ+YeLXtaA=

Ers0rc50nbjso0jbdZTmBw==

XQxVP45+F5OZn3ZBTC7MLe1OF3G5c5uK9A==

RHh4uwtsttjzlxy+eW3+

W+xQshfnvmF5n5x2d+cEVdBNIkQRHRE=

FwlyiuXNX0+Trw==

euLn91on/7DeDe++zbQ4YeLXtaA=

td4cO8m3HDRWtl8p7Q==

ZrlyAAPqc3GXI5k=

OM0IisKOI78FJC/IuIxxAu5nRg==

d6A0QJ6PV+AOpyK+eW3+

+EgxFWUu3Ulatl8p7Q==

GC/stck1ILXn+cWZx7w8W6rPFmO6c5uK9A==

hhIiK4+CKEOfB4tr

mA1pyQ85ye8N

4xgWYcEpEoidv8eXKNncAQ==

L+hOVbe+IWyc8oVUclc=

J7EGaJ+L+wKLXUYg7w==

L5R/nfdgQdMHD+TUKw1Zo3Hb

Targets

    • Target

      Deposit g.exe

    • Size

      929KB

    • MD5

      9e8d9ab3894d103439345412327c1440

    • SHA1

      bf2afcd8f8db5f3d14621449a5c75ba347adcca3

    • SHA256

      9a36bb988eb1f8bc83089fc9b406e8fc95ad96c6ef8466b497ec3b34220f6ef3

    • SHA512

      d9131bdec04ddf1bb6f472510256c40c3197cf0636e7f4f14859aeb795ce8b25b2f016e02bc1fd99d7b596580984aee63f4e88bf6662649b702219f9639c04d6

    • SSDEEP

      24576:6P5w2x86hvebmPEDagcDhxxxTPouoQHpOLCAVxs:6P5w2x3vf8DaguLgulHpMCAHs

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks