General

  • Target

    713290575.exe

  • Size

    271KB

  • Sample

    221207-h5hh5sfa73

  • MD5

    042c5506f6d384f18529e2247c09b2d1

  • SHA1

    f6e91718b5bcf487e1fc040d228e87c7cdf72aae

  • SHA256

    34ba86fe0e8ed621b916cf851855cd2c616af85a19534bfc25b5806ca43cbb58

  • SHA512

    7d2fc7c1ebf7eea04c3846ff99ac7ba55a8f98225a4a3e679e55b3d9b9887487c822582cb4fb85493b66ac9c2d3e501872e8bfb2f6f87d36315051bf9f0cbaa3

  • SSDEEP

    6144:QBn1ufsqsOrt2ureZR0SJ+9/NDEBeZSeR36:guEIt2urg2/NDEBeZrR36

Malware Config

Extracted

Family

formbook

Campaign

yurm

Decoy

X06d1tis1GUX/R0g87Ud

BKiZ33D1P766GVXO1ZwV

lAFdjB7CSxGX8Trz

Gc7dWizTVxWX8Trz

tDkr9JAfi1OHAW1PGOageIp4

bCpMtHKU3mVp8BY5sQ==

7WKpsMWt8nsrhJClJeOZNg==

0A9KTlETQ86Cmd8k0o5NP5RwCg==

aJ61paNJztSp42c=

CrgoA8ySIOsytCbO1ZwV

i46SnHYDD9tTIHI=

XFRCRCjtFZeU3x4Rn3xfD5BnPz+RDA==

c4CZghuHvzW9A31gEz0d

QAjzz9qyRRWBNYseAI4M

Jpbmu4A1YvBvN3ruZgiRmJA5BCFd

PfoFXGNFhhuX8Trz

bqCfk0m8ApAl+Tm1Ms5Tb23IT7tS

z7INff7HNALxc5HWq2/ftrVR6A7R1zvTUQ==

m7IShV4LSFxbqxhrVsZ1Ig==

BHRp7q0gtoRuqBRnVsZ1Ig==

Targets

    • Target

      713290575.exe

    • Size

      271KB

    • MD5

      042c5506f6d384f18529e2247c09b2d1

    • SHA1

      f6e91718b5bcf487e1fc040d228e87c7cdf72aae

    • SHA256

      34ba86fe0e8ed621b916cf851855cd2c616af85a19534bfc25b5806ca43cbb58

    • SHA512

      7d2fc7c1ebf7eea04c3846ff99ac7ba55a8f98225a4a3e679e55b3d9b9887487c822582cb4fb85493b66ac9c2d3e501872e8bfb2f6f87d36315051bf9f0cbaa3

    • SSDEEP

      6144:QBn1ufsqsOrt2ureZR0SJ+9/NDEBeZSeR36:guEIt2urg2/NDEBeZrR36

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Tasks