General

  • Target

    6722fc544a3a7e67963eca47d376e278.exe

  • Size

    1.2MB

  • Sample

    231016-jqrc6scf4s

  • MD5

    6722fc544a3a7e67963eca47d376e278

  • SHA1

    6a39e15b0f50529830451ea1ec581737e902c922

  • SHA256

    be5a1d27153819f4c4eb1c96efb064deee2cf91d3cb7494377cc16adbe51e2e7

  • SHA512

    0c99b308f158c264bb9d6915c4e400701cfc7e8afef754668d9b7daf4d3519850be45c8616b47d2de7d6d39d2d4fd68c8057588931cd056958ff8747561c04c6

  • SSDEEP

    24576:iFoEhCKAXS/1+O9P1Bza+78soKoxm5OST6Iytld3BIwbgKcQrE/k2+VVN:iF9ii/1+O9P1BB8soKXx7ytldxnV

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

wise-transfer.info

jam-nins.com

thebestsocialcrm.com

majomeow222.com

ancientshadowguilt.space

gentleman-china.com

parquemermoz.store

taxuw.com

sharqiyapaints.com

libraryofkath.com

1949wan.com

synqr.net

bitchessgirls.com

btonu.cfd

coding-bootcamps-16314.com

leadership22-tdh.site

maximsboutique.com

irishsummertruffles.com

sdnaqianchuan.com

uyews.xyz

Targets

    • Target

      6722fc544a3a7e67963eca47d376e278.exe

    • Size

      1.2MB

    • MD5

      6722fc544a3a7e67963eca47d376e278

    • SHA1

      6a39e15b0f50529830451ea1ec581737e902c922

    • SHA256

      be5a1d27153819f4c4eb1c96efb064deee2cf91d3cb7494377cc16adbe51e2e7

    • SHA512

      0c99b308f158c264bb9d6915c4e400701cfc7e8afef754668d9b7daf4d3519850be45c8616b47d2de7d6d39d2d4fd68c8057588931cd056958ff8747561c04c6

    • SSDEEP

      24576:iFoEhCKAXS/1+O9P1Bza+78soKoxm5OST6Iytld3BIwbgKcQrE/k2+VVN:iF9ii/1+O9P1BB8soKXx7ytldxnV

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks