General

  • Target

    e83d65ee23f397269dd89a_JC.exe

  • Size

    790KB

  • Sample

    230729-ryb78ade75

  • MD5

    ba5b5793f7b2f43e7b1c70ada9e926ad

  • SHA1

    47a170ba23b45e5f4fa5b7c4995c0dfde8891ab3

  • SHA256

    e83d65ee23f397269dd89a621fba51c803ea65652d22679fe6e6dcdc16e798c5

  • SHA512

    2cf36760b97c5e32cb431151c92492fb94bc333509d894b7d41049cf734e710c5d62ac01de6fc1971d863dc5abbff4067a967534223fccf006bc4adbf719b00c

  • SSDEEP

    24576:rk/A25GoqxIJs7ks3XJrPz6cDCnvMuqv9:rKAKGj7ks35rPmaCnvMTv9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t3c9

Decoy

shadeshmarriagemedia.com

e-russ.com

sofiashome.com

theworriedwell.com

americantechfront.com

seasonssparkling.com

maximuscanada.net

tifin-private-markets.com

amecc2.net

xuexi22.icu

injectiontek.com

enrrocastoneimports.com

marvelouslightcandleco.com

eaamedia.com

pmediaerp.com

tikivips111.com

chesterfieldcleaningcare.com

thecrowdedtablemusic.com

duncanvillepanthers.com

floriculturajoinville.xyz

Targets

    • Target

      e83d65ee23f397269dd89a_JC.exe

    • Size

      790KB

    • MD5

      ba5b5793f7b2f43e7b1c70ada9e926ad

    • SHA1

      47a170ba23b45e5f4fa5b7c4995c0dfde8891ab3

    • SHA256

      e83d65ee23f397269dd89a621fba51c803ea65652d22679fe6e6dcdc16e798c5

    • SHA512

      2cf36760b97c5e32cb431151c92492fb94bc333509d894b7d41049cf734e710c5d62ac01de6fc1971d863dc5abbff4067a967534223fccf006bc4adbf719b00c

    • SSDEEP

      24576:rk/A25GoqxIJs7ks3XJrPz6cDCnvMuqv9:rKAKGj7ks35rPmaCnvMTv9

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Suspicious use of NtCreateProcessOtherParentProcess

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks