General

  • Target

    eddd6ccb6801986267e55fc7a676aeb4_JaffaCakes118

  • Size

    814KB

  • Sample

    240920-smkkwssgph

  • MD5

    eddd6ccb6801986267e55fc7a676aeb4

  • SHA1

    a0b02e09425f5a21b0936d9de18703a7b2e858a5

  • SHA256

    6cb226cb2bc243d2b6b0421624a03ef846377b4527df1bc908b76f7b2a871f6d

  • SHA512

    5da7b04d9d61405a2420140455a9f91c5ef7ac6866eb1f15ca2641a965f4d708a50a5c38f5704ae5cc9e0303d3f5eb7933fa527df35e0966f82a12458b69cffb

  • SSDEEP

    12288:e+WhWEyIulu5kghlYyUyY0WoXf+WMyzVodUqGHXoqYH6N79/v5kgMZ:eIRIj5kghmyvffAy2GV4PaN79/v5kgw

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

ch36

Decoy

hookbug.com

useicar.net

plentyofhosting.com

finalmary.win

pacwestcoastalproperties.com

prideharmonyfoundation.com

royaltakeout.com

lephare-shop.com

alphaomeganetworks.com

solistkonsilanlari.com

yj-info.net

badajozbeerlab.com

wwwjsvip9999.com

centraltexasrvpark.net

hosofb789.com

roademissions.com

toscanaristorazione.com

jrmsj.com

sweetsncandy.com

hzcrgg.com

Targets

    • Target

      eddd6ccb6801986267e55fc7a676aeb4_JaffaCakes118

    • Size

      814KB

    • MD5

      eddd6ccb6801986267e55fc7a676aeb4

    • SHA1

      a0b02e09425f5a21b0936d9de18703a7b2e858a5

    • SHA256

      6cb226cb2bc243d2b6b0421624a03ef846377b4527df1bc908b76f7b2a871f6d

    • SHA512

      5da7b04d9d61405a2420140455a9f91c5ef7ac6866eb1f15ca2641a965f4d708a50a5c38f5704ae5cc9e0303d3f5eb7933fa527df35e0966f82a12458b69cffb

    • SSDEEP

      12288:e+WhWEyIulu5kghlYyUyY0WoXf+WMyzVodUqGHXoqYH6N79/v5kgMZ:eIRIj5kghmyvffAy2GV4PaN79/v5kgw

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Formbook payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks