General

  • Target

    a3553c3a25028d72c2e0b256c566fc62_JaffaCakes118

  • Size

    881KB

  • Sample

    240613-bplgjasemp

  • MD5

    a3553c3a25028d72c2e0b256c566fc62

  • SHA1

    8396247cd7f45565ceea3e40bfec58081761d510

  • SHA256

    e9c75f9f951a7bcfbd1920d431ccc152b46e47af8b79e9040e95cb33402d017e

  • SHA512

    2ac529bf6141b147eefe04db1065dc2d40ca8ee71d1210184e40e6cb3add1f6dad82e876ccde0c4034545341dc3d6b61ebb12e77353fd19d38821ea8ae3b78f6

  • SSDEEP

    24576:f2O/GlVZNLsi1BOLQN0QeznLOCLs2lQlZP69e1:cZVWLSGznuri94

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

eb

Decoy

mainstreamhosting.biz

warp-speed.email

valkyrieuav.com

darlingweekends.com

beyazs.com

kreasidesain.com

trod.ltd

njbarberbattle.com

mono.guru

danacoquangnam.com

acuaspring.store

quiclkiestores.com

indycdandvinyl.net

innovation-quest.info

myyoutubevidz.com

findmysuperhero.com

clipvuicuoi.com

hemerasexperience.com

meganoti.com

hoezpa.men

Targets

    • Target

      a3553c3a25028d72c2e0b256c566fc62_JaffaCakes118

    • Size

      881KB

    • MD5

      a3553c3a25028d72c2e0b256c566fc62

    • SHA1

      8396247cd7f45565ceea3e40bfec58081761d510

    • SHA256

      e9c75f9f951a7bcfbd1920d431ccc152b46e47af8b79e9040e95cb33402d017e

    • SHA512

      2ac529bf6141b147eefe04db1065dc2d40ca8ee71d1210184e40e6cb3add1f6dad82e876ccde0c4034545341dc3d6b61ebb12e77353fd19d38821ea8ae3b78f6

    • SSDEEP

      24576:f2O/GlVZNLsi1BOLQN0QeznLOCLs2lQlZP69e1:cZVWLSGznuri94

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks