General

  • Target

    https://github.com/enginestein/Virus-Collection

  • Sample

    240809-tqflsawfrf

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

he2a

Decoy

connectioncompass.store

zekicharge.com

dp77.shop

guninfo.guru

mamaeconomics.net

narcisme.coach

redtopassociates.com

ezezn.com

theoregondog.com

pagosmultired.online

emsculptcenterofne.com

meet-friends.online

pf326.com

wealthjigsaw.xyz

arsajib.com

kickassholdings.online

avaturre.biz

dtslogs.com

lb92.tech

pittalam.com

Targets

    • Target

      https://github.com/enginestein/Virus-Collection

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Contacts a large (7864) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Formbook payload

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks