General

  • Target

    eeabc02c0c8b1e32a032f2573a61e8154570f6d9d9485bf40207328bd14447cf.exe

  • Size

    615KB

  • Sample

    240829-ct4dksygmc

  • MD5

    a61e0f9405c19b6a69b58b188742a29b

  • SHA1

    7ec8239ac5bc2c81eee837a34c20a0c0d3f80f0d

  • SHA256

    eeabc02c0c8b1e32a032f2573a61e8154570f6d9d9485bf40207328bd14447cf

  • SHA512

    4ffc7639947075def3efee67fd5c4b0b0c7432cd8286a230697140d1707d96a9e6c2de010677720de67b2ea9ac37c8b7972cbe31d462158471475a68daffab06

  • SSDEEP

    12288:3iTkgmb19n6FYnamMF2+jQ8yXUH4RfQcyTH4UkxVLObe49PnWE3XVJaHkkR:STvmb19uYajVQFPyTHbkxV4T14HD

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m49z

Decoy

ormswarm.xyz

awn-care-63587.bond

uymetanail5.online

mergencyloan007.xyz

545.top

eiliao596.pro

ackersandmoverschennai.net

ehdiahmadvandmusicbest.click

tlgxmb2024.cloud

ulfcoastharborhopper.pro

rohns-disease-early-signs.today

oldenhorizonsbgcl.click

weetindulgencepro.xyz

yexoiup.xyz

yself-solar.net

kfirsatimla.online

bropub3.online

ouljourney.online

usvf76f.shop

onnaberich.online

Targets

    • Target

      eeabc02c0c8b1e32a032f2573a61e8154570f6d9d9485bf40207328bd14447cf.exe

    • Size

      615KB

    • MD5

      a61e0f9405c19b6a69b58b188742a29b

    • SHA1

      7ec8239ac5bc2c81eee837a34c20a0c0d3f80f0d

    • SHA256

      eeabc02c0c8b1e32a032f2573a61e8154570f6d9d9485bf40207328bd14447cf

    • SHA512

      4ffc7639947075def3efee67fd5c4b0b0c7432cd8286a230697140d1707d96a9e6c2de010677720de67b2ea9ac37c8b7972cbe31d462158471475a68daffab06

    • SSDEEP

      12288:3iTkgmb19n6FYnamMF2+jQ8yXUH4RfQcyTH4UkxVLObe49PnWE3XVJaHkkR:STvmb19uYajVQFPyTHbkxV4T14HD

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks