General

  • Target

    943d44f043396e794716c4d82c4345e749eead0807592339cdde186a7bd83c51.exe

  • Size

    701KB

  • Sample

    240820-b6qgta1fpn

  • MD5

    c78aa012edcc2d521eecab410fbadf7c

  • SHA1

    cd47fafb1d77a2cc71f215ef2f01f4e19fc79338

  • SHA256

    943d44f043396e794716c4d82c4345e749eead0807592339cdde186a7bd83c51

  • SHA512

    2b2c09a78f3767fa6d7c7c765177b671a2c00f6d136e239c1d68d4d2c001bbdf6ae9ed6f5c372c028f303eef506afac6d182433446e04e8605a8166e58226ce9

  • SSDEEP

    12288:bJNxCwgqaVouyHOdP6xwAJDmnd8BNdjEevS+ik7pDHEbrT84ub04nhXj6GHC0Pl4:bbxC/qaSuyHOZ+mn+PdYcS+ikOb804Ff

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pz12

Decoy

paucanyes.com

autonwheels.com

cowboysandcaviarbar.com

fitnessengineeredworkouts.com

nuevobajonfavorito.com

dflx8.com

rothability.com

sxybet88.com

onesource.live

brenjitu1904.com

airdrop-zero1labs.com

guangdongqiangzhetc.com

apartments-for-rent-72254.bond

ombak99.lol

qqfoodsolutions.com

kyyzz.com

thepicklematch.com

ainth.com

missorris.com

gabbygomez.com

Targets

    • Target

      943d44f043396e794716c4d82c4345e749eead0807592339cdde186a7bd83c51.exe

    • Size

      701KB

    • MD5

      c78aa012edcc2d521eecab410fbadf7c

    • SHA1

      cd47fafb1d77a2cc71f215ef2f01f4e19fc79338

    • SHA256

      943d44f043396e794716c4d82c4345e749eead0807592339cdde186a7bd83c51

    • SHA512

      2b2c09a78f3767fa6d7c7c765177b671a2c00f6d136e239c1d68d4d2c001bbdf6ae9ed6f5c372c028f303eef506afac6d182433446e04e8605a8166e58226ce9

    • SSDEEP

      12288:bJNxCwgqaVouyHOdP6xwAJDmnd8BNdjEevS+ik7pDHEbrT84ub04nhXj6GHC0Pl4:bbxC/qaSuyHOZ+mn+PdYcS+ikOb804Ff

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks