General

  • Target

    1d77e6b59c60817f9c5b17e620db8c30a6fda1c3ae638961f3a907b78d4e9128.exe

  • Size

    716KB

  • Sample

    240802-bs7tyaxcqq

  • MD5

    2d6a88e10dfe5531ed92d544673dbf28

  • SHA1

    ae492a0598cc2f6edaeb6ba2c9fbc0f863a4b295

  • SHA256

    1d77e6b59c60817f9c5b17e620db8c30a6fda1c3ae638961f3a907b78d4e9128

  • SHA512

    973ea348ad79ccb41ab918daa9f4563b6e4f5e1036b8f0c55dcb85cb5a37db28d298455b8c898e361d9fde1b177f709a14f0424b56d921ca257809bc8db66a37

  • SSDEEP

    12288:kU3929BC4rqhpFR/gnsb7GtDUABGSFprkijFML6n3gZ0kzmwt23xNFVH0lDkR:kU89BNuhXJgnsb7GtbFprk8qL63ENmwE

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ps15

Decoy

57797.asia

jhpwt.net

basketballdrillsforkids.com

zgzf6.rest

casinomaxnodepositbonus.icu

uptocryptonews.com

gomenasorry.com

fortanix.space

stripscity.xyz

genbotdiy.xyz

mayson-wedding.com

neb-hub.net

seancollinsmusic.com

migraine-treatment-57211.bond

prosperawoman.info

tradefairleads.tech

xn--yeminlitercme-6ob.com

xwaveevent.com

fashiontrendshub.xyz

window-replacement-80823.bond

Targets

    • Target

      1d77e6b59c60817f9c5b17e620db8c30a6fda1c3ae638961f3a907b78d4e9128.exe

    • Size

      716KB

    • MD5

      2d6a88e10dfe5531ed92d544673dbf28

    • SHA1

      ae492a0598cc2f6edaeb6ba2c9fbc0f863a4b295

    • SHA256

      1d77e6b59c60817f9c5b17e620db8c30a6fda1c3ae638961f3a907b78d4e9128

    • SHA512

      973ea348ad79ccb41ab918daa9f4563b6e4f5e1036b8f0c55dcb85cb5a37db28d298455b8c898e361d9fde1b177f709a14f0424b56d921ca257809bc8db66a37

    • SSDEEP

      12288:kU3929BC4rqhpFR/gnsb7GtDUABGSFprkijFML6n3gZ0kzmwt23xNFVH0lDkR:kU89BNuhXJgnsb7GtbFprk8qL63ENmwE

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks