General

  • Target

    JaffaCakes118_d1255a8e6e758462c32a5a4bccaf7886ba9f12c8a8a54c987a6192740d83dda7

  • Size

    1.0MB

  • Sample

    241225-z3w27axqax

  • MD5

    0241849895f92f8eb3790b0c2c6ab9cc

  • SHA1

    6cf2913ad53b447e77f43fbbb9c1643f553c19a7

  • SHA256

    d1255a8e6e758462c32a5a4bccaf7886ba9f12c8a8a54c987a6192740d83dda7

  • SHA512

    7068b97a1b73645a768979e7ec0ef6ccf45eced9245707bab0f8adeb20ccb61596a19490f94f46310defe62c8da5b6605398b69ec3999360e362a3a9ddb01532

  • SSDEEP

    24576:+sXY7GxjMfihdPzmPwJH2FJCG5rpfv/cTTKd7c6TooM6:hXPxvhxz0zHncXKRt8p6

Malware Config

Extracted

Family

formbook

Version

3.7

Campaign

ol

Decoy

strucewe.info

woodenboxescompany.com

advertisingstreaming.com

deyimeng.com

brightestcolorimaginable.com

magnusmaterial.net

juicyflights.co.uk

xtraincome4you.com

atxiao.net

iscreenuscream.com

mytmaps.com

kursbhp.online

dapurbundakreatif.com

beheartratemonitoringkey.live

vfullmovie.info

sueredman.com

protonpoetic.win

chungcusamsora-premier.com

wpexpert.store

edition62.com

Targets

    • Target

      FORMBOOK.bin

    • Size

      1.4MB

    • MD5

      f2b788dd73b7ead8f3721782f2034fe4

    • SHA1

      f6dc7ba2b002c430f5693efdc79123f7e519bcb8

    • SHA256

      3c011d08f75514a4f4bcdd02314b903c546ad8f16186541f8f79661744100e5b

    • SHA512

      a6c0ace122fdc9897666a5520934b22523a53a2d2d0e1f586b3b8600a695d7f2f4327243e030934c126717b12cea534123d1cea47f9507c4241d1c2e31a16bc5

    • SSDEEP

      24576:ugZYp/WKU61KnS/IHqjQt6LBknxzqx2e4ZTq+9TrLZ7BO+m/7gnM:uQY5bdIJH6Umkx0kZR9y+q7gnM

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • UAC bypass

    • Formbook payload

    • Adds policy Run key to start application

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks