General

  • Target

    d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277.exe

  • Size

    688KB

  • Sample

    240821-nbccxsyfpj

  • MD5

    44919bd4c653cbd956628a0a5c1adf22

  • SHA1

    c09669285e613c1cada8b50b0e9704dfd93fa31d

  • SHA256

    d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277

  • SHA512

    ffdf8c78835070e82672c38f634f710f7505061f36267cd0f034a07b061e65f89a7f0ade93e5c89a6691ad2770f05f8f69f70c0196bec2efb29220b17657385e

  • SSDEEP

    12288:TNqsCwgqaVouc0PlsfdG2FXwC++UuVFK2T2y9Xl4mOv7TPbiH34ihoIgyo:TTC/qaSucKMduaFK2SwVLc7TsBhoI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bi05

Decoy

ollow-the-bit.online

aopho.autos

14ra567dp.autos

48651301.top

ussian-dating-54714.bond

sychology-degree-80838.bond

lytracker.xyz

strology-forest.sbs

swjbcl3.top

ridgenexttechnologies.partners

lroy.sbs

kyscreen.vip

anhit.live

uckyheart.xyz

orddserials.online

hetune.shop

nherited-traits-ant.bond

stanaslot-1.xyz

sychologist-therapy-36914.bond

iandramonami.net

Targets

    • Target

      d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277.exe

    • Size

      688KB

    • MD5

      44919bd4c653cbd956628a0a5c1adf22

    • SHA1

      c09669285e613c1cada8b50b0e9704dfd93fa31d

    • SHA256

      d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277

    • SHA512

      ffdf8c78835070e82672c38f634f710f7505061f36267cd0f034a07b061e65f89a7f0ade93e5c89a6691ad2770f05f8f69f70c0196bec2efb29220b17657385e

    • SSDEEP

      12288:TNqsCwgqaVouc0PlsfdG2FXwC++UuVFK2T2y9Xl4mOv7TPbiH34ihoIgyo:TTC/qaSucKMduaFK2SwVLc7TsBhoI

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks