General

  • Target

    SWIFT Transfer (103) 022FT102211200045.exe

  • Size

    942KB

  • Sample

    221122-qjx1pshc6t

  • MD5

    ac5eacf84181813856e7699c2e12ea78

  • SHA1

    43b57de4fef7246cc298de4001b2da4e5054a48e

  • SHA256

    eff390745ac05246fb469a01d7cb05409dee8f0275c809b3a7b6dfc0c58ddc7a

  • SHA512

    79cde4d8e390e766d3e49c09c9a2ac1e79d1684ff28c7bc3e4749451f31942d2a5fad133f8c514b7d6c832c8b3ebc971ef115d4107b90ec5f8062e739985f4bf

  • SSDEEP

    24576:1M+L74mBfNUstzokMMRPkFMBC7J5FXhbqd4Q813r8JN:FH85mWQ81I

Malware Config

Extracted

Family

formbook

Campaign

n2hm

Decoy

XCeG4IxNKbAl

YzJWbnC+El84nA==

KAJcdmP8yEcO5LXPCFF42Wfb

I+J+xYO95GJQWVU=

GtgxPPv3FmQmhw==

Og9NYF4xEl+j7vGTR93xvg==

506Cg07bsT0G6yK+A96H0h35V+JLkwI=

wAYXFN+pSFIXgQ==

ijzLI/f+FmQmhw==

UfT2PweNm+w8

GQWVw5aZnfF/kS5e

30BKYjua9zcA7gAwsPUngLnjyrBNEgo=

AM65OrmyFmQmhw==

VSlTVxISZ4J/kS5e

GGKj6K33SRh6e0/YzT5nQGlK5CXRqw==

B9H98cUUfX+AWOqiTA==

MxVffWOIoVnM37zrd2sTaOY=

z6bxCgG/mGhR7oDzQA==

pQgSLSRi6AK3M/PdArpX

6rRRsYuSnXx/kS5e

Targets

    • Target

      SWIFT Transfer (103) 022FT102211200045.exe

    • Size

      942KB

    • MD5

      ac5eacf84181813856e7699c2e12ea78

    • SHA1

      43b57de4fef7246cc298de4001b2da4e5054a48e

    • SHA256

      eff390745ac05246fb469a01d7cb05409dee8f0275c809b3a7b6dfc0c58ddc7a

    • SHA512

      79cde4d8e390e766d3e49c09c9a2ac1e79d1684ff28c7bc3e4749451f31942d2a5fad133f8c514b7d6c832c8b3ebc971ef115d4107b90ec5f8062e739985f4bf

    • SSDEEP

      24576:1M+L74mBfNUstzokMMRPkFMBC7J5FXhbqd4Q813r8JN:FH85mWQ81I

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks