General

  • Target

    20092024_0758_20092024_purchase order.7Z

  • Size

    527KB

  • Sample

    240920-jt4snswdnb

  • MD5

    e4620e2f0970771672bd6d53504cb8ee

  • SHA1

    e18b0c66d9611d394a5fda78ee8b620a5b3c3626

  • SHA256

    26d114f221d28e6e9df7dac1596388600785c9e3611e41ff9d304952e4eb5a9b

  • SHA512

    c75f3334ebfa4a0ee4f366c516d1a5381ed86bc7b7b3062d16c752fcf2acad6fb355af8eca82d19f77f7d1910eff54cb4fdd85cad67883bbe958a418f2ab0a80

  • SSDEEP

    12288:euQhwJ2HNYE4G43qzRcaiiU1sXOEZL923EUo4Ef2Fk:VQIEgwRcai7ILCEP4R+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t94g

Decoy

32188.top

mergencyroofrepair656460.online

jkahu.fun

ur4.autos

r0lba4cl0qkaws8.bond

eiliaowang.top

urjav.xyz

kidaman15.click

old-removal-p350.today

levatethismedia.info

h33323s40.top

dormy.click

5406.club

earlofwisdombook.pro

6980.app

ellwood999.biz

otdates.lol

164v.shop

thereal.app

takeget.online

Targets

    • Target

      purchase order.exe

    • Size

      547KB

    • MD5

      5296af4ed8e6f9d06274547012b5ba62

    • SHA1

      2da877c31b6213e05fe65219bcf8a422cbb5b68b

    • SHA256

      fc5677c59829c91effde4a5b050dd517d089cee3a6bf9eb752695f3402e2dc28

    • SHA512

      77d9d10b1cda513fcdb04bac41ff7511a301c450b6f2f23a2bd86b1f709a58545ec53baa961579b483999d1579c5d47942e889f2a66fe84e327c25947f9078e6

    • SSDEEP

      12288:f0wru3+OWz4QX9i1uNU1ubuMFZ0K6SYwg+5dVZ54ohPuyrHQj:swyU9iQNhbue6PHOdVZ54oa

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks