General

  • Target

    94dffd62b364ce09c1b49f3800c95a00.exe

  • Size

    1MB

  • Sample

    231207-kcnkssgd78

  • MD5

    94dffd62b364ce09c1b49f3800c95a00

  • SHA1

    6e077611ce429c9cde930ee61516d9571010c3e8

  • SHA256

    54ace0a6c8165c2f14b4277246c3725c28eb54fbe76193f49ddfaa317b206734

  • SHA512

    f4dd1185b12a894ee8d6b99ba413943f0e1bb76f0195f1c110c18b8eff48ee85716c71dc25d798282ac8193e9ec869d2077ca3360d902ab2569b89fa362a855d

  • SSDEEP

    24576:nxCxAUDAImqXeE8oqGQCbPEzbjvy27wEtmQ4Xl+gWeq9X9VxHfg8IitnJ0MNd:nx6VDNXr1+vzwEtmQA+qq/H48htnOM/

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

qh1n

Decoy

hyw0902destiny.xyz

mkquan.net

tisml8yn.top

norcliffecapital.com

dennemeyer-antipiracy.com

kastlosa.com

ghsdhzs.com

fdkeatlah.best

pvpvhhhvmk1z5r7.xyz

pumperwopingrld.com

traveloka.website

yunzhizhao.top

wtwvmemphis.com

aquaceen.com

flynovaa.info

qr-sens.events

yihetrading.com

miamipaintingcompany.com

kunikokaizu.shop

kapudianzi.com

Targets

    • Target

      94dffd62b364ce09c1b49f3800c95a00.exe

    • Size

      1MB

    • MD5

      94dffd62b364ce09c1b49f3800c95a00

    • SHA1

      6e077611ce429c9cde930ee61516d9571010c3e8

    • SHA256

      54ace0a6c8165c2f14b4277246c3725c28eb54fbe76193f49ddfaa317b206734

    • SHA512

      f4dd1185b12a894ee8d6b99ba413943f0e1bb76f0195f1c110c18b8eff48ee85716c71dc25d798282ac8193e9ec869d2077ca3360d902ab2569b89fa362a855d

    • SSDEEP

      24576:nxCxAUDAImqXeE8oqGQCbPEzbjvy27wEtmQ4Xl+gWeq9X9VxHfg8IitnJ0MNd:nx6VDNXr1+vzwEtmQA+qq/H48htnOM/

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks