General
-
Target
58b9ef070518321fd67fea27324eeee25b99318bd5c40bd34b2e33ffb4037d56
-
Size
514KB
-
Sample
220521-ass54sdfhj
-
MD5
283be86b2919fa598bb3a9dec9d01282
-
SHA1
0ac204e6a57a52079bcd3a43bc387fb2154abacb
-
SHA256
58b9ef070518321fd67fea27324eeee25b99318bd5c40bd34b2e33ffb4037d56
-
SHA512
bcaef0d1e5563a614fca480c285c245e0a43630ddef0610939324b483540a146cadf0ac70586f8bdb1237f6a14b5ec0b2c624719e3ddfed147f78643f4eabdf4
Static task
static1
Behavioral task
behavioral1
Sample
PO PI.exe
Resource
win7-20220414-en
Malware Config
Extracted
formbook
4.1
wus
generativecoaching.net
skillmosaic.com
practicalmaster.com
12aminmiami.com
instagramsupport.online
mainelse.net
qqysmr.com
wealthxd.com
videoadscreator.com
dltzscl.com
cotaforjulyans.com
forcend.com
shinjukufilm.com
bsq30.com
dragonsrose.net
loganbuys.com
wwwfitnessymusica.com
microbladingdublin.com
corporateiconic.com
sunshinegroupnyc.com
cpc000.com
aerialliftland.com
50j6tfl4t7.biz
phransus.com
sepez.com
alephmim.com
mobster.tech
armanismiami.com
maviswancyzk.com
prephurricane.com
danielryanwrites.com
niruli96.party
westgastro-lbc.com
gofoodieweb.com
daveselectricalco.com
treasuresofwallstreet.com
ebaychinadirect.com
michaelmaffait.com
konnect-4.com
weiguanwo.com
joycestravels.com
allstatehurricaneirmaclaims.com
necoservicios.com
kuishei.com
twentydc.scot
semohomesource.com
graymensociety.com
jswmpc.com
tlpropertybuyers.com
azteccar.com
thesourcespirit.com
fhtps.com
sabrinacameron.com
130aa4.com
junowagashi.com
seocherubin.com
fashionnpva.com
photoidrental.com
sierraassets.net
zhubao258.com
athenscraftbeerexpo.com
zzizzle.net
greengoenvironmental.com
goveducc.com
howcuty.com
Targets
-
-
Target
PO PI.exe
-
Size
460KB
-
MD5
9a931b93992bd36af52ea345cef3af98
-
SHA1
dbe897227e9df2b0dc809068df011722d0bbf7a2
-
SHA256
8e9f882576a66be70ed5bc204584037087f3bd53d13498126153fb7514f7dd7a
-
SHA512
46eecbeae1e8d591f0b8f7a76bc260538f92b1b4cbd3b69b0fecc6a85c9d839c79e0dc7e047620b52bdc406c2346abd4ca8ba35b47fdb32082f407d470bf8f43
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-