General

  • Target

    06082024_0319_05082024_00253390 pjg.exe.xz

  • Size

    549KB

  • Sample

    240806-dt53vaxhpn

  • MD5

    6880252aa37f23d2ed655707d03ef238

  • SHA1

    3cf8f64adc7db95bd39a6028cdc334c8454b7660

  • SHA256

    0898bf70b09c89bf0153ec7c2073b605d08b5ca2d0d780b6e56c6dd13dfedbf2

  • SHA512

    ba4fb753fb85b3e40767cc926a88871274c2bae59653564f37d8123f3ada9755fbd74dfe95c77f0a593e4cdb3ce9e9c5fd979a12d6da4485c75ddf2ca5aeb9fa

  • SSDEEP

    12288:VTYkdKTTi7ADs+RbdON6d6iFsuO+NB1L5Nooo+Mjz1751wV3XI5/bFbgcu:lYkY3WYbdO6pabqt+l+MXX1s3KFMx

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      06082024_0319_05082024_00253390 pjg.exe

    • Size

      2.7MB

    • MD5

      5ef32b214d2f96f8490a1bc80cd69b8c

    • SHA1

      bf5d22d99cb7a904ab2747e24dc443ccd97f2527

    • SHA256

      7f75fa52a4033aafb55eec07a5a901e357baa76ef4c1c6e109c7f5c4dd99c9eb

    • SHA512

      34d9eb853da9250e83340dd9e364dbe5c2c7e0b180296a012e899180e52bde781282dfe081f946c8da0e1eb91d9a496358fe9902eac58c3f0c249ea3bdba5058

    • SSDEEP

      24576:gLn/zhq30bbdI6Xa4KtHl3MXX1s34FMV7I:gLn7h9PCQRKd0X1A4F5

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • UAC bypass

    • Windows security bypass

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks