General

  • Target

    bc0ef9408fc18184938d89d695f8fb2b_JaffaCakes118

  • Size

    468KB

  • Sample

    240618-p7j83sydpp

  • MD5

    bc0ef9408fc18184938d89d695f8fb2b

  • SHA1

    e6198d3ab82269f4d4c6309c918330190dcf693c

  • SHA256

    6698735d635bc7b991236e31da603fd2f08cb9c2e41fbc8c0aed7efbdf63f9a7

  • SHA512

    9397077dd2388af14a39aad7191ad05e0f9a40faea7e44ea879a56bd44da3a5fbbcaa2792486c145d1166f9fd8dbf8c2ee47803221758c07b6634822f4eb65db

  • SSDEEP

    6144:QEsI1tKVCRk4tywG4JSW2H79BKZ2RLHVIgFXAExTAvVSMfGdZ1z:QESVp4tyJ4YH7q2QNE+NNfGd

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

he

Decoy

ajnonline.info

marpolos.com

lzj97.com

meijiatp.com

soyoung-dongha.com

arrambideabogados.com

tannor.net

f1yc33j0wmn.biz

geboooth.com

battery365.net

nu-entry.com

obaldo.net

downstreamlatam.com

belkysfloral.net

chwaimai.com

winningpowermomentum.com

transitiontomedicare.net

creationglobalcrew.com

mimtechs.com

indianplesur.com

Targets

    • Target

      bc0ef9408fc18184938d89d695f8fb2b_JaffaCakes118

    • Size

      468KB

    • MD5

      bc0ef9408fc18184938d89d695f8fb2b

    • SHA1

      e6198d3ab82269f4d4c6309c918330190dcf693c

    • SHA256

      6698735d635bc7b991236e31da603fd2f08cb9c2e41fbc8c0aed7efbdf63f9a7

    • SHA512

      9397077dd2388af14a39aad7191ad05e0f9a40faea7e44ea879a56bd44da3a5fbbcaa2792486c145d1166f9fd8dbf8c2ee47803221758c07b6634822f4eb65db

    • SSDEEP

      6144:QEsI1tKVCRk4tywG4JSW2H79BKZ2RLHVIgFXAExTAvVSMfGdZ1z:QESVp4tyJ4YH7q2QNE+NNfGd

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Installer Packages

1
T1546.016

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Installer Packages

1
T1546.016

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks