General

  • Target

    add7248ca082a7fd942f2d8f4c8518aa56beb5e68411b709ca40d2665869eb45.rar

  • Size

    623KB

  • Sample

    240903-crlezswbma

  • MD5

    ee20427a27946c8557b7aa4e64c0dccf

  • SHA1

    bf28278f292b131ab3c3734db187f85b33abab49

  • SHA256

    add7248ca082a7fd942f2d8f4c8518aa56beb5e68411b709ca40d2665869eb45

  • SHA512

    7d00bfb0d52128af85a30da6395bfe50ddeeab61b57c514848fa0a45a708ed1fc9b0b8f7619382880773b34f9f9d597edc1940559aba398ca41bea3fc22e6e52

  • SSDEEP

    12288:SueJ2eeOp7rLlGtX6cW0rRLg8j2rvZJF19ZCOXRoWcob5fBR:S/eOJrLAXthC7PmOXRhc89

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

p25o

Decoy

hrist-centered-soulcare.net

pacerpa.shop

hicandcurvy.shop

ocfamilyto.llc

9ds87666.men

sia918ku.shop

nvestment-broker-35141.bond

ltralicencas.shop

g1lmb.cyou

eyo.live

pupt.rest

indsetperfection.net

1duqqrzs65zxz.bond

eren138-pro2.click

leaning-products-35959.bond

oodea.online

hlbadienug.info

innivip.bio

funnygame.top

roperty-in-dubai-f.pro

Targets

    • Target

      BOM-V29--20240618 Overdue.exe

    • Size

      696KB

    • MD5

      88295402509cd6179f6366109ddfc576

    • SHA1

      7623027c3bf6394176e98784b598d711698d5350

    • SHA256

      cbc824c8cdf2c25b2b4e2f43163f34232ecbded388c7e0c0f01c52b4657e8f7d

    • SHA512

      9f438650d18c88f198d6e90bae25f8d32ab2dfee0155637c69272b6c434f1970fa542474e807444936833ee9bd9094706dbf3de55dc311198753503a81a12871

    • SSDEEP

      12288:cGZKzvuLBKYvI8yuQoa5afqsEO6KcMQ6y+j45cBrx+qaxI58lRWPxHvMCDtHC4+e:JLOPu1LDEO6K9FDl+qkI5+WpHkCDt4a7

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks