General

  • Target

    2280daf7833aa5d80687a96918686f78

  • Size

    483KB

  • Sample

    231231-bea8tabebk

  • MD5

    2280daf7833aa5d80687a96918686f78

  • SHA1

    541849a9f7a912b9d441e80e1fdde08f96f9312e

  • SHA256

    038f3c4864fe8d2a18a3ecbf539730f91e44f4bda80b6be8fb78930e9248657d

  • SHA512

    0e5319f65cd13d0f1a5179d63e05a2b4fefadef28d208f4570c87708a11773ac4b792f4e99f697d7c3155532d55d60bf0dc8aa558558ab2874b32fac5d1f598c

  • SSDEEP

    6144:/IFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9E:Sh8Mz+sv3y2N1xzAZprkmuN/SD5iKefW

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ow

Decoy

piavecaffe.com

jlxkqg.men

lifesavingfoundation.net

karadasama.net

michaeltraolach-macsweeney.com

thunderwatches.com

serviciocasawhirlpool.biz

c-cap.online

itparksolution.com

clarityhearingkw.com

wpgrosiri.date

colemarshalcambell.com

webperffest.com

adjusterforirma.info

buildersqq.com

spiritualwisdominindia.com

111222333.net

traditionalarabicdishes.com

hmlifi.com

receive-our-info-heredaily.info

Targets

    • Target

      2280daf7833aa5d80687a96918686f78

    • Size

      483KB

    • MD5

      2280daf7833aa5d80687a96918686f78

    • SHA1

      541849a9f7a912b9d441e80e1fdde08f96f9312e

    • SHA256

      038f3c4864fe8d2a18a3ecbf539730f91e44f4bda80b6be8fb78930e9248657d

    • SHA512

      0e5319f65cd13d0f1a5179d63e05a2b4fefadef28d208f4570c87708a11773ac4b792f4e99f697d7c3155532d55d60bf0dc8aa558558ab2874b32fac5d1f598c

    • SSDEEP

      6144:/IFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9E:Sh8Mz+sv3y2N1xzAZprkmuN/SD5iKefW

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks