General

  • Target

    Pendingpayments.zip

  • Size

    757KB

  • Sample

    240920-j8jfaaxajd

  • MD5

    a636bc53d53650d76e1d3e8644e672a1

  • SHA1

    59e1cc08634559e79ca794966870b9917d3b4661

  • SHA256

    c7405e08770d0160a5305a55af23d062b2a218f8f1baba0519573efeec706623

  • SHA512

    fa49980f2acd00e2d9ff9e0d0f8b6aaf46b39a41e7e40fe6a28842d9be3e81f7ec8f4f08a14ffaa859b987977ecd39260a23c787445ac1f173dea8513e4abb1b

  • SSDEEP

    12288:z/gBT51V14eECqni+OaUPazqgY51s7aec6G0xS4Elb/KmfjOe2UUXom3kwPBrKb:TgBTS7nt6Ztmnc6vEhffj7UXom3fZa

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c89p

Decoy

ftersaleb.top

dcustomdesgins.net

ostbet2024.live

rhgtrdjdjytkyhretrdjfytd.buzz

atauniversity.tech

idoctor365.net

x-design-courses-29670.bond

ellowold-pc.top

ransportationmmsytpro.top

areerfest.xyz

artiresbah-in.today

ijie.pro

torehousestudio.info

69-11-luxury-watches.shop

earing-tests-44243.bond

hits.shop

hzl9.bond

lood-test-jp-1.bond

livialiving.online

usymomsmakingmoney.online

Targets

    • Target

      Pending payments.exe

    • Size

      772KB

    • MD5

      96df83409286c456fa56c37a0d5098be

    • SHA1

      9140c707f2e625caa4f300ccbc2c1f7136048b64

    • SHA256

      1dab7f07bfa344e601226bc0657decbabd3b421fd207e031ae99ccfbc5637414

    • SHA512

      3ea8150f356a1ba5ab75f6d49db8fa7e0cc86aa850575f605df308de4ba9248739745f5ade53135ac5be167abeb5246b0452141091a3665f0ff19f09e806557f

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqLv/ZbzqgYP1Q7aem6GKxA4ElbxKEfbOeuOU5Km3awZ:tthEVaPqLv/Eb2nm8VEHffb/U5Km3ZkG

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks