General

  • Target

    2Owjjl45F6zxq40.exe

  • Size

    475KB

  • Sample

    200712-2y4mhatfk6

  • MD5

    5a27d64f2afc5755986ed501f2561f00

  • SHA1

    017c299bc06a8631b0646b732824dc33f0f74566

  • SHA256

    2f645ad832ecb3de614ff355e67bb7db84812294921a247f7ce1c8b9667f56d0

  • SHA512

    7ae558dc146c971ed0457d0a006269c6431375f2fb2c2fea88376ff968aafd4361ffb48ee371a53584c6e7e18354714d8b40f9bc87344e8b3f552d3910ead481

Malware Config

Targets

    • Target

      2Owjjl45F6zxq40.exe

    • Size

      475KB

    • MD5

      5a27d64f2afc5755986ed501f2561f00

    • SHA1

      017c299bc06a8631b0646b732824dc33f0f74566

    • SHA256

      2f645ad832ecb3de614ff355e67bb7db84812294921a247f7ce1c8b9667f56d0

    • SHA512

      7ae558dc146c971ed0457d0a006269c6431375f2fb2c2fea88376ff968aafd4361ffb48ee371a53584c6e7e18354714d8b40f9bc87344e8b3f552d3910ead481

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Adds Run entry to policy start application

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks