General

  • Target

    51e9b7b57d361aa62f8276d03af686736c54187cf38fb8800cc6b34b04a0c359.7z

  • Size

    775KB

  • Sample

    240920-bqaressamr

  • MD5

    a01f2e0604739f7e3672515899712dc2

  • SHA1

    05031dbc1679b64259b84bd3a08df6281bf051a1

  • SHA256

    51e9b7b57d361aa62f8276d03af686736c54187cf38fb8800cc6b34b04a0c359

  • SHA512

    685af5c1547f611a828b93ffebc5edeaf0bed1156a69f9e34ac8697a6993b15e7277704494642289772020ccab5821790eab27ebc0fdf652baa87358c4bcf860

  • SSDEEP

    12288:M59oOSei8tiliQAq2upGY9sb1HqnDXvqa23xxUoRuGCC1Jkd6XbZwZXmFfj/sHsP:MemYjnTvqjjxH25Z2hj/KTZg

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

wise-transfer.info

jam-nins.com

thebestsocialcrm.com

majomeow222.com

ancientshadowguilt.space

gentleman-china.com

parquemermoz.store

taxuw.com

sharqiyapaints.com

libraryofkath.com

1949wan.com

synqr.net

bitchessgirls.com

btonu.cfd

coding-bootcamps-16314.com

leadership22-tdh.site

maximsboutique.com

irishsummertruffles.com

sdnaqianchuan.com

uyews.xyz

Targets

    • Target

      Specification and Quantity Pdf.exe

    • Size

      1.6MB

    • MD5

      686fed0af9eebb2581701d4e08e9ff0b

    • SHA1

      3c9f400ba8c6fe7f35f20bca09e59d3bb8169035

    • SHA256

      219a330b7ae9807411d289f28169861fc748f50212ae2317278bfe155d89990f

    • SHA512

      178d525f08b12ccca7c2a11f230e4bd83b74d28d17f15c13696937f57e4272aa34b0542aca6890e032ff7d4732be426ef00dcc54adceb70bd71f05cbd6d6bb00

    • SSDEEP

      49152:YAodtaG9kS2U84B+FLan9k5TRM9zlxVjZfjQq:I/B13fjQq

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks