General

  • Target

    20092024_0754_20092024_Payment Copy $47,091.00.zip

  • Size

    748KB

  • Sample

    240920-jrwdhswfrl

  • MD5

    205c999e3a1fe6638f991dc8bb16f1ca

  • SHA1

    3f029d21dc56f791fff7e1441c64f218c9603351

  • SHA256

    5894aa7c461f3b4ba1114eb0633873f0a022d7cf4af5517c3881d3dadf8b5347

  • SHA512

    b6300deebe8a33a175f63e951d1b3d360fb46c2659388a080ab4f2281a9b14ae08254fba43384123155c427355af454ff3b3c933a27da05c774f7c271c5071c3

  • SSDEEP

    12288:P/gBT51V14eECqni+OaTp+fCN5+CTO5Tnv9bm2cZB4f7cEIsvIUhwh7UQtJZIFOI:3gBTS7nt3+fC7+0O5Tv7QBUchUwOmgcI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c89p

Decoy

ftersaleb.top

dcustomdesgins.net

ostbet2024.live

rhgtrdjdjytkyhretrdjfytd.buzz

atauniversity.tech

idoctor365.net

x-design-courses-29670.bond

ellowold-pc.top

ransportationmmsytpro.top

areerfest.xyz

artiresbah-in.today

ijie.pro

torehousestudio.info

69-11-luxury-watches.shop

earing-tests-44243.bond

hits.shop

hzl9.bond

lood-test-jp-1.bond

livialiving.online

usymomsmakingmoney.online

Targets

    • Target

      Payment Copy $47,091.00.exe

    • Size

      762KB

    • MD5

      1cfab4e68a14edd1b9a4c54561a8aa69

    • SHA1

      6712b67cc45056cc9d3bd27c0a5f6b5c29eabae1

    • SHA256

      8d83a9a3bbd6e63e37b6d66c4febdbcf17a48fe77fabdd52c5bfa01a661a33da

    • SHA512

      a3f100f9a0026e29352c2af3e94ab0f20bd4c45799545b0104b6c1029d2904d9b06a160f58db7a3467562686cdabd4cfd74d8ea5b49af68a31fc541490b759d0

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqL8CN5+CROltnD9bmAcZBYfFcEYsvIU/wR7UmtJZeFQ:tthEVaPqL8C7+wOltDrQB0cPUwesmrS

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks