General

  • Target

    86de2e406f7fe5e5d5c7cefa5aa49061

  • Size

    483KB

  • Sample

    240201-pf1fzsfbdj

  • MD5

    86de2e406f7fe5e5d5c7cefa5aa49061

  • SHA1

    2b2949047631b7abd4c8f44b5322a28bf4deaabc

  • SHA256

    9184a3c0ca571280bd6e33bd05a9c15e7568fd2968f752b333605191e9cd87d7

  • SHA512

    ee393e974ebd757a12b27a731d2c64ff837709961bfd30bd847aef15bb795dd03c1f9e727f02ac7e712032dc4e109f9ff3d98fe6b7eb3561ea4586b395d1b68e

  • SSDEEP

    6144:QIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9+:dh8Mz+sv3y2N1xzAZprkmuN/SD5iKef4

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ow

Decoy

piavecaffe.com

jlxkqg.men

lifesavingfoundation.net

karadasama.net

michaeltraolach-macsweeney.com

thunderwatches.com

serviciocasawhirlpool.biz

c-cap.online

itparksolution.com

clarityhearingkw.com

wpgrosiri.date

colemarshalcambell.com

webperffest.com

adjusterforirma.info

buildersqq.com

spiritualwisdominindia.com

111222333.net

traditionalarabicdishes.com

hmlifi.com

receive-our-info-heredaily.info

Targets

    • Target

      86de2e406f7fe5e5d5c7cefa5aa49061

    • Size

      483KB

    • MD5

      86de2e406f7fe5e5d5c7cefa5aa49061

    • SHA1

      2b2949047631b7abd4c8f44b5322a28bf4deaabc

    • SHA256

      9184a3c0ca571280bd6e33bd05a9c15e7568fd2968f752b333605191e9cd87d7

    • SHA512

      ee393e974ebd757a12b27a731d2c64ff837709961bfd30bd847aef15bb795dd03c1f9e727f02ac7e712032dc4e109f9ff3d98fe6b7eb3561ea4586b395d1b68e

    • SSDEEP

      6144:QIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9+:dh8Mz+sv3y2N1xzAZprkmuN/SD5iKef4

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks