General

  • Target

    PI and payment confirmed pdf.exe

  • Size

    1.7MB

  • Sample

    231126-kkac5sfh66

  • MD5

    ae014e9d876464412d3180a8235dbdef

  • SHA1

    bdd571e383b4915f3d68c9747740f209e1c31c94

  • SHA256

    ea5cca67b84c377c1c50e3e978fa2bcf6d178e8ce9cb23971c3304359b23e435

  • SHA512

    a968178b49ce7a49ee9a0a22c0b94e6890100e5ac61d6332827486ca2dde7e2c20e4c42f6b80461302c035821b34f80d0288e78d309b01711b838bad926a585c

  • SSDEEP

    49152:bZAtX8IxTqh0eJa3DZEe9sRuCVCW4TMyqChsQ:bZmXX8Za31CuCcXMXC+Q

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

wise-transfer.info

jam-nins.com

thebestsocialcrm.com

majomeow222.com

ancientshadowguilt.space

gentleman-china.com

parquemermoz.store

taxuw.com

sharqiyapaints.com

libraryofkath.com

1949wan.com

synqr.net

bitchessgirls.com

btonu.cfd

coding-bootcamps-16314.com

leadership22-tdh.site

maximsboutique.com

irishsummertruffles.com

sdnaqianchuan.com

uyews.xyz

Targets

    • Target

      PI and payment confirmed pdf.exe

    • Size

      1.7MB

    • MD5

      ae014e9d876464412d3180a8235dbdef

    • SHA1

      bdd571e383b4915f3d68c9747740f209e1c31c94

    • SHA256

      ea5cca67b84c377c1c50e3e978fa2bcf6d178e8ce9cb23971c3304359b23e435

    • SHA512

      a968178b49ce7a49ee9a0a22c0b94e6890100e5ac61d6332827486ca2dde7e2c20e4c42f6b80461302c035821b34f80d0288e78d309b01711b838bad926a585c

    • SSDEEP

      49152:bZAtX8IxTqh0eJa3DZEe9sRuCVCW4TMyqChsQ:bZmXX8Za31CuCcXMXC+Q

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks