General

  • Target

    E-dekont_pdf.exe

  • Size

    334KB

  • Sample

    230327-mhpq6ada25

  • MD5

    994934144a89538302535b4135d4c414

  • SHA1

    46497b9718efb3538c0414e4b238e6d70c0f4230

  • SHA256

    41618cb3eabd9750fa776f31b8117e4025fd3d03af5e30d62100d84ce8101406

  • SHA512

    6cac6c803d40a8803bfae685e81f041a02330b55baeb822aa5a1074cf48872f9bc3748ae43725760ad27c9226f53ac7ded37ff8b335311eff53470e5d754485e

  • SSDEEP

    6144:H6+/tVa/10URQbxpXRj/7O2KSMlEAYdvrvsNkK+a7u5YX1S/eNPLbQg:Pna/mzbxpBj/7bKTEAYtrupYM8g

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

be83

Decoy

woodlandscancercare.org.uk

hosting-delightful.lol

bilpreco.com

diplomk-v-habarovske.com

dzgck.com

jsdappraisals.com

digitalnishant.com

bluevibesgift.com

wowchershoo.co.uk

eudoriaofficial.online

ourcampaign2024.net

barlogcode.com

calmingscents.biz

thewaterfallproject.africa

www-1911.com

cigapp.online

wooddroppers.africa

casmiya.com

haruminailbar.com

drivermindset.com

Targets

    • Target

      E-dekont_pdf.exe

    • Size

      334KB

    • MD5

      994934144a89538302535b4135d4c414

    • SHA1

      46497b9718efb3538c0414e4b238e6d70c0f4230

    • SHA256

      41618cb3eabd9750fa776f31b8117e4025fd3d03af5e30d62100d84ce8101406

    • SHA512

      6cac6c803d40a8803bfae685e81f041a02330b55baeb822aa5a1074cf48872f9bc3748ae43725760ad27c9226f53ac7ded37ff8b335311eff53470e5d754485e

    • SSDEEP

      6144:H6+/tVa/10URQbxpXRj/7O2KSMlEAYdvrvsNkK+a7u5YX1S/eNPLbQg:Pna/mzbxpBj/7bKTEAYtrupYM8g

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks