General

  • Target

    nDpCRftIevGVro2.exe

  • Size

    909KB

  • Sample

    200712-9p2bnxp1le

  • MD5

    99ee30484749b90ac5ca3e2a776a0198

  • SHA1

    ac6b11d0a4ebf636008cf1d39f4889b2c55ae0bc

  • SHA256

    ee82b7263174f6d14a23263058616fda1c4676cecf6d0003696d255147963e1b

  • SHA512

    606727a606b7a95ff1ed285c9b9ac61c4c29e05b5fa48c337ba394e8151c9e96678109203f9df2e20d4bbe16be70674c58a673d4332af1b146e7f80784a36a31

Malware Config

Targets

    • Target

      nDpCRftIevGVro2.exe

    • Size

      909KB

    • MD5

      99ee30484749b90ac5ca3e2a776a0198

    • SHA1

      ac6b11d0a4ebf636008cf1d39f4889b2c55ae0bc

    • SHA256

      ee82b7263174f6d14a23263058616fda1c4676cecf6d0003696d255147963e1b

    • SHA512

      606727a606b7a95ff1ed285c9b9ac61c4c29e05b5fa48c337ba394e8151c9e96678109203f9df2e20d4bbe16be70674c58a673d4332af1b146e7f80784a36a31

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks