General

  • Target

    f3fe763c0bab8b6423578bbe031190508406459cf1648b47dcba314c95ca8fbc.exe

  • Size

    720KB

  • Sample

    240806-c475hsxbjp

  • MD5

    8bc1a99eb7877ceb4fc51338ef7fe9f2

  • SHA1

    e16dc5f7b5af7340c8ccf95f0bb66f4dc7516053

  • SHA256

    f3fe763c0bab8b6423578bbe031190508406459cf1648b47dcba314c95ca8fbc

  • SHA512

    8e1768e9fb8279dad8deba557e3d06c65646508c87cd18c9b3d031969ee9ebec2024cc9af3cfcbb5d497d835049364726542c9ca3e7259d5d2b30491dc61bcbc

  • SSDEEP

    12288:tU3929BC4rqhp2ejzGSs89JtD0EEdf6aqjCScbuyUIzEYPmRDCVZkR:tU89BNuhT489J90EEdf6aSci+9E

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ps15

Decoy

57797.asia

jhpwt.net

basketballdrillsforkids.com

zgzf6.rest

casinomaxnodepositbonus.icu

uptocryptonews.com

gomenasorry.com

fortanix.space

stripscity.xyz

genbotdiy.xyz

mayson-wedding.com

neb-hub.net

seancollinsmusic.com

migraine-treatment-57211.bond

prosperawoman.info

tradefairleads.tech

xn--yeminlitercme-6ob.com

xwaveevent.com

fashiontrendshub.xyz

window-replacement-80823.bond

Targets

    • Target

      f3fe763c0bab8b6423578bbe031190508406459cf1648b47dcba314c95ca8fbc.exe

    • Size

      720KB

    • MD5

      8bc1a99eb7877ceb4fc51338ef7fe9f2

    • SHA1

      e16dc5f7b5af7340c8ccf95f0bb66f4dc7516053

    • SHA256

      f3fe763c0bab8b6423578bbe031190508406459cf1648b47dcba314c95ca8fbc

    • SHA512

      8e1768e9fb8279dad8deba557e3d06c65646508c87cd18c9b3d031969ee9ebec2024cc9af3cfcbb5d497d835049364726542c9ca3e7259d5d2b30491dc61bcbc

    • SSDEEP

      12288:tU3929BC4rqhp2ejzGSs89JtD0EEdf6aqjCScbuyUIzEYPmRDCVZkR:tU89BNuhT489J90EEdf6aSci+9E

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks