General

  • Target

    GXB032199034.js

  • Size

    2.7MB

  • Sample

    230808-glp87scd5s

  • MD5

    528d4b33434e3c8ce689f137dba1c894

  • SHA1

    09cf5206b5b80e2cf130a313699cd50f3d62709d

  • SHA256

    9406c764fa44815b3cb4c105f2cc051dd2e764086ec7df66e49992e5c9681f01

  • SHA512

    706251e9e9dd62b30268f4a9c0888de390d201ae4af0b0725358efe4399db2404e850195678495b857d66a76a831a65849f04a6cc7b28735a42b5a04e8604486

  • SSDEEP

    6144:STNgGWMXjQS3H1WfCovS9TuaDqFBpgU5MXZDJ+5svwXJ6ho1LpEieK4W2WxzD2pi:qtid

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

me15

Decoy

thegrill253.com

arthousecorp.com

acre-com.com

dreambarnhollow.com

winwin220693.online

shinohtrade.com

blockcchain.help

8hx3.vip

lifeshinelearning.com

havencoinvestmentgroup.com

thebesthomehacks.com

the-country-wiki.com

xskt.club

sunrisemedia.space

crecrown.com

0hpail.cyou

artwelding.store

psilome.com

layerbabuena.club

miras.shop

Extracted

Family

wshrat

C2

http://45.90.222.131:7121

Targets

    • Target

      GXB032199034.js

    • Size

      2.7MB

    • MD5

      528d4b33434e3c8ce689f137dba1c894

    • SHA1

      09cf5206b5b80e2cf130a313699cd50f3d62709d

    • SHA256

      9406c764fa44815b3cb4c105f2cc051dd2e764086ec7df66e49992e5c9681f01

    • SHA512

      706251e9e9dd62b30268f4a9c0888de390d201ae4af0b0725358efe4399db2404e850195678495b857d66a76a831a65849f04a6cc7b28735a42b5a04e8604486

    • SSDEEP

      6144:STNgGWMXjQS3H1WfCovS9TuaDqFBpgU5MXZDJ+5svwXJ6ho1LpEieK4W2WxzD2pi:qtid

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Formbook payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Blocklisted process makes network request

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks