General

  • Target

    e5590f3ca36c707f3cec8c6fdfecfa949233708dae9b8d11f020906b8058bffa.exe

  • Size

    1.7MB

  • Sample

    231127-wbbqdsbc2z

  • MD5

    4fa301c6f5c6013be9d3b136ef6fbb96

  • SHA1

    1e1e6227b2bc7426b168a492c4b8d202478be1a4

  • SHA256

    e5590f3ca36c707f3cec8c6fdfecfa949233708dae9b8d11f020906b8058bffa

  • SHA512

    797b816d9163ad032caafcaed0ec43f8c7f3e4689ca61ea71776ff1bc1a5d08aacf671fbb07cdd2be9e10736c2d3a7253763156cb2d91c107d8916e3f758bfc1

  • SSDEEP

    49152:bZAtX8IxTqh0eJa3DZEe9sRuCVCW4lMyqChsQ:bZmXX8Za31CuCc5MXC+Q

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

6nrs

Decoy

mteverestminiralwater.com

northlakesodllcgov.com

de-guru.com

iwz-69.com

323va.com

tiktokshopbuilder.com

sekisensei.com

jcpublicschoolsfoundation.com

yangguangdadao.net

dingshenghr.net

yzyz458.xyz

topmczonseo.com

financeconta.com

handtools-88870.bond

scymedia.online

rutman.store

qlpss.com

righitch.com

parentsrpeople2.com

appeal-request-review.com

Targets

    • Target

      e5590f3ca36c707f3cec8c6fdfecfa949233708dae9b8d11f020906b8058bffa.exe

    • Size

      1.7MB

    • MD5

      4fa301c6f5c6013be9d3b136ef6fbb96

    • SHA1

      1e1e6227b2bc7426b168a492c4b8d202478be1a4

    • SHA256

      e5590f3ca36c707f3cec8c6fdfecfa949233708dae9b8d11f020906b8058bffa

    • SHA512

      797b816d9163ad032caafcaed0ec43f8c7f3e4689ca61ea71776ff1bc1a5d08aacf671fbb07cdd2be9e10736c2d3a7253763156cb2d91c107d8916e3f758bfc1

    • SSDEEP

      49152:bZAtX8IxTqh0eJa3DZEe9sRuCVCW4lMyqChsQ:bZmXX8Za31CuCc5MXC+Q

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks