General

  • Target

    c655a9035e1f9ee5d55f78_JC.xz

  • Size

    333KB

  • Sample

    230728-w7e3pagf62

  • MD5

    ba8534b97e394249fdbfed013eae852c

  • SHA1

    fc9710660eacaba1ee5403855edf79956958d3e8

  • SHA256

    c655a9035e1f9ee5d55f78511de8189130fbbebb613f34de1c1a823e2bb351a4

  • SHA512

    0f7b58e3ce8f69e89403751e854ed8cedbe0d4bfb29b137eaa6789bae4b27c8a1fa475d74476254b19dbbc2d8e82a96dbffa528c62a2734da441dc3368eb760f

  • SSDEEP

    6144:78N/1UP/RUUYaEIjiZdVnqGRllZxwHH8UaPWYmR6Jzo3sgtl+:78NGP/RUEWVnqGRllfUcUyWN6Jzo3sgi

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t3c9

Decoy

shadeshmarriagemedia.com

e-russ.com

sofiashome.com

theworriedwell.com

americantechfront.com

seasonssparkling.com

maximuscanada.net

tifin-private-markets.com

amecc2.net

xuexi22.icu

injectiontek.com

enrrocastoneimports.com

marvelouslightcandleco.com

eaamedia.com

pmediaerp.com

tikivips111.com

chesterfieldcleaningcare.com

thecrowdedtablemusic.com

duncanvillepanthers.com

floriculturajoinville.xyz

Targets

    • Target

      c655a9035e1f9ee5d55f78_JC

    • Size

      790KB

    • MD5

      ba5b5793f7b2f43e7b1c70ada9e926ad

    • SHA1

      47a170ba23b45e5f4fa5b7c4995c0dfde8891ab3

    • SHA256

      e83d65ee23f397269dd89a621fba51c803ea65652d22679fe6e6dcdc16e798c5

    • SHA512

      2cf36760b97c5e32cb431151c92492fb94bc333509d894b7d41049cf734e710c5d62ac01de6fc1971d863dc5abbff4067a967534223fccf006bc4adbf719b00c

    • SSDEEP

      24576:rk/A25GoqxIJs7ks3XJrPz6cDCnvMuqv9:rKAKGj7ks35rPmaCnvMTv9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Suspicious use of NtCreateProcessOtherParentProcess

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks