General

  • Target

    e5d97a568f1962694316e3ac3f5120e1c2aae9d6c6a16f2b9cceed793b4377b4.xz

  • Size

    918KB

  • Sample

    240831-ch7lvszfql

  • MD5

    5c3df6dd010f21668ac83b8f7d0e4f91

  • SHA1

    f54c207e56dd48d661280b77ade52664c313f554

  • SHA256

    e5d97a568f1962694316e3ac3f5120e1c2aae9d6c6a16f2b9cceed793b4377b4

  • SHA512

    00f1b231a93ffe8cea1904ac026932978f61bc507aa44d309926d86ba93371065c3688cd2fde4a44848cda1098da5bc16dc05c41121d8a321cdaf4de9ffc9720

  • SSDEEP

    24576:tvtkczBHNQ5nU2NDRwPxhAzjeD6KIHlMAg:tvtkOknUKagzjAIHlMAg

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      e5d97a568f1962694316e3ac3f5120e1c2aae9d6c6a16f2b9cceed793b4377b4

    • Size

      2.0MB

    • MD5

      5e8e7dd95b3e592a44a3c61b7f8d91f8

    • SHA1

      d829b9e1e99087d94f527f359184f65b608190c5

    • SHA256

      8d278608d1d1c4c5b6c048020c23351e75203066af1ae1e63c5c5ac0170cd3de

    • SHA512

      a9846b798e89596da64cfeb844a5dcb3eefa983972cc4433cb6861464a386900a9035428187e5ae4e8b666a70df7c147f48884c512ee5823bcd1275072fc8d60

    • SSDEEP

      49152:tl2eQMj254Xra+qk6okjyjxKtyEAqVG13lwUWQdHt:76euw

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks