General

  • Target

    ca264140a1f253e55e891d883a7dbf74_JaffaCakes118

  • Size

    592KB

  • Sample

    240830-d6y53avcrh

  • MD5

    ca264140a1f253e55e891d883a7dbf74

  • SHA1

    e6ab69e4269ddfe19da3b1c57c974969ce2e0030

  • SHA256

    52e78449928063d1d867d0023a1e4aa7f211cf631538724411eb54f4b08fc411

  • SHA512

    0c6349873736284cd7839ad32fdac93d04b341d81f649596aed2f4d22e756f8a24bcaa9e991a77fd1901e7a0c3445c5407b7795adf09cc8a1d63768ebfdf5dab

  • SSDEEP

    6144:aVZMpuFhHs1b7Np49aSbeXg3OebAfFlG0jUv7qtpBm/m3w0+yoyoMGGGGGGGGGG5:SZM8FhH4b7N6auPbuGurmuVHKHjl

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

hx291

Decoy

leeandyoung.com

nashvillenewhomeguide.net

trailogue.com

iamnotaboutthat.life

iconomer.com

man818.com

beyoustyles.com

grand-casino40.com

jhg3.com

holidayshowcase.net

cccc742.com

allthingshandmade.info

bawslightwart.win

qa-dpetty-eph1-181-01.com

bulletproofprimitivesupply.com

kdtoken.com

xn--kpr97v9pdb00c.com

753qle.info

silverdragonai.com

futureshoes.store

Targets

    • Target

      ca264140a1f253e55e891d883a7dbf74_JaffaCakes118

    • Size

      592KB

    • MD5

      ca264140a1f253e55e891d883a7dbf74

    • SHA1

      e6ab69e4269ddfe19da3b1c57c974969ce2e0030

    • SHA256

      52e78449928063d1d867d0023a1e4aa7f211cf631538724411eb54f4b08fc411

    • SHA512

      0c6349873736284cd7839ad32fdac93d04b341d81f649596aed2f4d22e756f8a24bcaa9e991a77fd1901e7a0c3445c5407b7795adf09cc8a1d63768ebfdf5dab

    • SSDEEP

      6144:aVZMpuFhHs1b7Np49aSbeXg3OebAfFlG0jUv7qtpBm/m3w0+yoyoMGGGGGGGGGG5:SZM8FhH4b7N6auPbuGurmuVHKHjl

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Formbook payload

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks