General

  • Target

    benzway.exe

  • Size

    686KB

  • Sample

    200630-jpqy9jlgvs

  • MD5

    b299b28f77a9de1c0f5bb30cf8522aa2

  • SHA1

    ae5ec84f56c65239862745ef217d6b883f0375d6

  • SHA256

    ae438370eda70ba48a763c526e61b068e16d11cbd00e9cb504d6f1eeb7442d22

  • SHA512

    2180b191e4a5bf82443c85e74f68bf63ea6a821ac26813c46e50acf4fda5cdbb6303f1f13510c18e0081ac3ffcf563857c76ce05fffafcde3a6d763373d007ec

Malware Config

Targets

    • Target

      benzway.exe

    • Size

      686KB

    • MD5

      b299b28f77a9de1c0f5bb30cf8522aa2

    • SHA1

      ae5ec84f56c65239862745ef217d6b883f0375d6

    • SHA256

      ae438370eda70ba48a763c526e61b068e16d11cbd00e9cb504d6f1eeb7442d22

    • SHA512

      2180b191e4a5bf82443c85e74f68bf63ea6a821ac26813c46e50acf4fda5cdbb6303f1f13510c18e0081ac3ffcf563857c76ce05fffafcde3a6d763373d007ec

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Adds Run entry to policy start application

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks