Resubmissions

14/06/2024, 17:55 UTC

240614-whnzas1ara 10

14/06/2024, 17:12 UTC

240614-vqvldazapd 10

14/06/2024, 17:11 UTC

240614-vp9c5stanq 10

12/06/2024, 23:53 UTC

240612-3xrgaswcpa 10

General

  • Target

    3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe

  • Size

    747KB

  • Sample

    240614-vqvldazapd

  • MD5

    3cd2595e3d20f8200d3ddf84b81932de

  • SHA1

    c05f5a5fd2e0da7be16621a5482541f3d492891c

  • SHA256

    3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c

  • SHA512

    fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670

  • SSDEEP

    12288:H7nYP1+rSlwFON6zXeEt+f2VtTwfyfyp4P7r9r/+ppppppppppppppppppppppp0:HDYP1+rDOkKderNqS1qU

Malware Config

Extracted

Family

404keylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.cheaperdomains.com.au
  • Port:
    25
  • Username:
    accounts@greatnortherntyres.com.au
  • Password:
    C0mplete
  • Email To:
    accounts@greatnortherntyres.com.au

Extracted

Family

formbook

Version

3.9

Campaign

cix

Decoy

stephaniperold.com

sorairo12.com

palumasteknik.com

marketing4proptech.com

iwanttoheargod.com

structured-waters.com

sunvalleyvacations.net

sanketweb.com

tmasco.com

d-valentine.com

engmousavi.com

lithiumtolashes.com

texastramper.com

shoemall.store

beginningguitarbook.com

wonderlustnfairytales.com

bizinabox.store

kmacg.net

cashgold4cash.com

smtpguide.com

Targets

    • Target

      3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c.exe

    • Size

      747KB

    • MD5

      3cd2595e3d20f8200d3ddf84b81932de

    • SHA1

      c05f5a5fd2e0da7be16621a5482541f3d492891c

    • SHA256

      3979bd4374308cc1a5a91f04c080b480dc4081dd2612aa2a9d1b504f09b7367c

    • SHA512

      fbc314a53bb2eeba48c0cf5793cc93b1f9361e62aa38de34c941d57bb677b0868e651ed46b783fef939c4b9659048b4a555c3e647201aae7ce1f9e9bf0731670

    • SSDEEP

      12288:H7nYP1+rSlwFON6zXeEt+f2VtTwfyfyp4P7r9r/+ppppppppppppppppppppppp0:HDYP1+rDOkKderNqS1qU

    • 404 Keylogger

      Information stealer and keylogger first seen in 2019.

    • 404 Keylogger Main Executable

    • 404Keylogger family

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.