General

  • Target

    7d39dde72383a557950523dfc9e5a64718323fcebf5d41aba286763c9ae7b39e.exe

  • Size

    771KB

  • Sample

    240810-bv3b8szbkr

  • MD5

    15cc82dce96d6980e2dc800b10a81495

  • SHA1

    005a539c30f4a640457dcd8b047278e8a93dd61b

  • SHA256

    7d39dde72383a557950523dfc9e5a64718323fcebf5d41aba286763c9ae7b39e

  • SHA512

    5ceaf03a2187dd14f793d278730f17b5a4fe907d57a319fb512fc6ad686e49d06d9f6d57b98261b54c2c37397f4b0661c954cea2f07acccb560a51f82d6921e3

  • SSDEEP

    12288:l8RMecnVV0TWQwZnBLhDqV/NX7WsfuyP1S3dktl8IfWoK811zF2JraZlJCjWcRQc:+43NdsVpWUQatlPlcJclJtcu

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pz12

Decoy

paucanyes.com

autonwheels.com

cowboysandcaviarbar.com

fitnessengineeredworkouts.com

nuevobajonfavorito.com

dflx8.com

rothability.com

sxybet88.com

onesource.live

brenjitu1904.com

airdrop-zero1labs.com

guangdongqiangzhetc.com

apartments-for-rent-72254.bond

ombak99.lol

qqfoodsolutions.com

kyyzz.com

thepicklematch.com

ainth.com

missorris.com

gabbygomez.com

Targets

    • Target

      7d39dde72383a557950523dfc9e5a64718323fcebf5d41aba286763c9ae7b39e.exe

    • Size

      771KB

    • MD5

      15cc82dce96d6980e2dc800b10a81495

    • SHA1

      005a539c30f4a640457dcd8b047278e8a93dd61b

    • SHA256

      7d39dde72383a557950523dfc9e5a64718323fcebf5d41aba286763c9ae7b39e

    • SHA512

      5ceaf03a2187dd14f793d278730f17b5a4fe907d57a319fb512fc6ad686e49d06d9f6d57b98261b54c2c37397f4b0661c954cea2f07acccb560a51f82d6921e3

    • SSDEEP

      12288:l8RMecnVV0TWQwZnBLhDqV/NX7WsfuyP1S3dktl8IfWoK811zF2JraZlJCjWcRQc:+43NdsVpWUQatlPlcJclJtcu

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks