General

  • Target

    PI and payment confirmed pdf.exe

  • Size

    1.0MB

  • Sample

    231212-jngqyshbfm

  • MD5

    90968fed8d599f4ec589f914d5a1ad4a

  • SHA1

    6cec0367c69eb6c64af42f0bc43797cac89f9395

  • SHA256

    facc6e911089bda494f8266b25d3a9b932494aac786f6fb3efb132f00db3aa29

  • SHA512

    f59903b9091869def1d891ea26dd7a197b5302249818a34baaaa148b39c5a5935f59cc5d45636f11f6dce94d64233739f94a7616ceb43c18dc368aa76abd0f2b

  • SSDEEP

    24576:0it4uJtHL/PkgSAq5dRHBez6oONXEef2sS5O3Yi:0iWiH7P85fsz6oM2m3/

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

wise-transfer.info

jam-nins.com

thebestsocialcrm.com

majomeow222.com

ancientshadowguilt.space

gentleman-china.com

parquemermoz.store

taxuw.com

sharqiyapaints.com

libraryofkath.com

1949wan.com

synqr.net

bitchessgirls.com

btonu.cfd

coding-bootcamps-16314.com

leadership22-tdh.site

maximsboutique.com

irishsummertruffles.com

sdnaqianchuan.com

uyews.xyz

Targets

    • Target

      PI and payment confirmed pdf.exe

    • Size

      1.0MB

    • MD5

      90968fed8d599f4ec589f914d5a1ad4a

    • SHA1

      6cec0367c69eb6c64af42f0bc43797cac89f9395

    • SHA256

      facc6e911089bda494f8266b25d3a9b932494aac786f6fb3efb132f00db3aa29

    • SHA512

      f59903b9091869def1d891ea26dd7a197b5302249818a34baaaa148b39c5a5935f59cc5d45636f11f6dce94d64233739f94a7616ceb43c18dc368aa76abd0f2b

    • SSDEEP

      24576:0it4uJtHL/PkgSAq5dRHBez6oONXEef2sS5O3Yi:0iWiH7P85fsz6oM2m3/

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Formbook payload

    • ModiLoader Second Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks