General

  • Target

    7fb1caac122f0f3640e234a54256f2a97b44bdd0881124191c352c7e797b7dc2.exe

  • Size

    678KB

  • Sample

    240917-bpmdtsyfnb

  • MD5

    faff8c18f098abe5b164c71391975ea0

  • SHA1

    9c009fe9d80e397e1d4198fabf8939db199098e0

  • SHA256

    7fb1caac122f0f3640e234a54256f2a97b44bdd0881124191c352c7e797b7dc2

  • SHA512

    feb01db87d4603825ea825a090a513fc68bf06652ca7956979de1b2d4722bddd4a72b73850f1207006a0532fbca920dcac5d0a191120de9b4dc6ed30e5fabae6

  • SSDEEP

    12288:V9isCwgqaVouV6KIEmxldpl1OsTOMofvDb0fo//KI4lMAj+SGnfo:V9jC/qaSucKI/h/OPfrb0+/KplMAjvGn

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rn10

Decoy

kedai168et.com

mental-olympics.com

pussybuildsstrongbones.net

857691.shop

hisellers.net

exposurecophotography.com

beaded-boutique.net

wednesdayholdings.com

plesacv.xyz

manonlineros.com

a0204.shop

333689g.com

dyprl716h.xyz

pulseirabet.com

fnet.work

bo-2024-001-v1-d1.xyz

ongaurdsecurity.com

giulianacristini.com

miladamani.com

magicalrealmshopkeeper.online

Targets

    • Target

      7fb1caac122f0f3640e234a54256f2a97b44bdd0881124191c352c7e797b7dc2.exe

    • Size

      678KB

    • MD5

      faff8c18f098abe5b164c71391975ea0

    • SHA1

      9c009fe9d80e397e1d4198fabf8939db199098e0

    • SHA256

      7fb1caac122f0f3640e234a54256f2a97b44bdd0881124191c352c7e797b7dc2

    • SHA512

      feb01db87d4603825ea825a090a513fc68bf06652ca7956979de1b2d4722bddd4a72b73850f1207006a0532fbca920dcac5d0a191120de9b4dc6ed30e5fabae6

    • SSDEEP

      12288:V9isCwgqaVouV6KIEmxldpl1OsTOMofvDb0fo//KI4lMAj+SGnfo:V9jC/qaSucKI/h/OPfrb0+/KplMAjvGn

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks