General

  • Target

    8d278608d1d1c4c5b6c048020c23351e75203066af1ae1e63c5c5ac0170cd3de.exe

  • Size

    2.0MB

  • Sample

    240831-b2hamsyelr

  • MD5

    5e8e7dd95b3e592a44a3c61b7f8d91f8

  • SHA1

    d829b9e1e99087d94f527f359184f65b608190c5

  • SHA256

    8d278608d1d1c4c5b6c048020c23351e75203066af1ae1e63c5c5ac0170cd3de

  • SHA512

    a9846b798e89596da64cfeb844a5dcb3eefa983972cc4433cb6861464a386900a9035428187e5ae4e8b666a70df7c147f48884c512ee5823bcd1275072fc8d60

  • SSDEEP

    49152:tl2eQMj254Xra+qk6okjyjxKtyEAqVG13lwUWQdHt:76euw

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      8d278608d1d1c4c5b6c048020c23351e75203066af1ae1e63c5c5ac0170cd3de.exe

    • Size

      2.0MB

    • MD5

      5e8e7dd95b3e592a44a3c61b7f8d91f8

    • SHA1

      d829b9e1e99087d94f527f359184f65b608190c5

    • SHA256

      8d278608d1d1c4c5b6c048020c23351e75203066af1ae1e63c5c5ac0170cd3de

    • SHA512

      a9846b798e89596da64cfeb844a5dcb3eefa983972cc4433cb6861464a386900a9035428187e5ae4e8b666a70df7c147f48884c512ee5823bcd1275072fc8d60

    • SSDEEP

      49152:tl2eQMj254Xra+qk6okjyjxKtyEAqVG13lwUWQdHt:76euw

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks