General

  • Target

    Ubevijukroxyde.exe

  • Size

    2.2MB

  • Sample

    231127-1ba63sda93

  • MD5

    06d1edbba5f83a0f13ca656672556f65

  • SHA1

    488b0ea60f9bf48a422812d7fa509c3f604766f7

  • SHA256

    0fda16a373440fc97605138e9d55cc140f75d85fcd3d420ea8df9b87172d51e6

  • SHA512

    7c8cc3836aef04ced7fccae6ba1665f923b5c2e680b4b337a6b5ec523702c75972064d3ba6007de97cd2f60b1fa36d70b478c1ad15e9e52eb9097403a4babf0c

  • SSDEEP

    49152:JWPpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41JFehg1mQmPoE:JCpcyV/wjpdZrxEVEtI145qnLPoE

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ao65

Decoy

spins2023.pro

foodontario.com

jsnmz.com

canwealljustagree.com

shopthedivine.store

thelakahealth.com

kuis-raja-borong.website

hbqc2.com

optimusvisionlb.com

urdulatest.com

akhayarplus.com

info-antai-service.com

kermisbedrijfkramer.online

epansion.com

gxqingmeng.top

maltsky.net

ictwath.com

sharmafootcare.com

mycheese.net

portfoliotestkitchen.com

Targets

    • Target

      Ubevijukroxyde.exe

    • Size

      2.2MB

    • MD5

      06d1edbba5f83a0f13ca656672556f65

    • SHA1

      488b0ea60f9bf48a422812d7fa509c3f604766f7

    • SHA256

      0fda16a373440fc97605138e9d55cc140f75d85fcd3d420ea8df9b87172d51e6

    • SHA512

      7c8cc3836aef04ced7fccae6ba1665f923b5c2e680b4b337a6b5ec523702c75972064d3ba6007de97cd2f60b1fa36d70b478c1ad15e9e52eb9097403a4babf0c

    • SSDEEP

      49152:JWPpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41JFehg1mQmPoE:JCpcyV/wjpdZrxEVEtI145qnLPoE

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks