General

  • Target

    8dcf6b86f74dcb0f83f203a7b34ba8a15c965a453c39a661fce9b6ba4d109cc4

  • Size

    744KB

  • Sample

    240924-sefa7stcpd

  • MD5

    24acd887788de94477ac871417d748d5

  • SHA1

    34196a74c386775a54d19520662f94c811e5be2f

  • SHA256

    8dcf6b86f74dcb0f83f203a7b34ba8a15c965a453c39a661fce9b6ba4d109cc4

  • SHA512

    4a014e5b854235b1c5a45e92952e5dffbacae933e044e5ed245a24f6f17ed70734f0786ea9161b065f0a7c47e956ba5cf6ceb0f51da442c4a90a45029743e97a

  • SSDEEP

    12288:b/gBT51V14eECqni+Oa84aR73OyCsGh5eUVtx6AfDieqV2jqPH88bGVUCYv++:LgBTS7nt+3DvCVh5eAtxDGevjqPH88/p

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c89p

Decoy

ftersaleb.top

dcustomdesgins.net

ostbet2024.live

rhgtrdjdjytkyhretrdjfytd.buzz

atauniversity.tech

idoctor365.net

x-design-courses-29670.bond

ellowold-pc.top

ransportationmmsytpro.top

areerfest.xyz

artiresbah-in.today

ijie.pro

torehousestudio.info

69-11-luxury-watches.shop

earing-tests-44243.bond

hits.shop

hzl9.bond

lood-test-jp-1.bond

livialiving.online

usymomsmakingmoney.online

Targets

    • Target

      Invoice, Parking List.exe

    • Size

      758KB

    • MD5

      6e39ee33f6527364cac3cc4bbf276f26

    • SHA1

      a7c12eef84ae778ce5158327d419508eb5b199c8

    • SHA256

      1a52416bc054c0f2a46f2fd215d73d3285334fcdacf02ed449935bd93fb70863

    • SHA512

      d06164091fe866df2626377b2d2589d9da291c73aff55b40db1844e32290c1f5e37b1ba8155ee02a351366df5a8862ce0b2e5b28a9b14b65cd568064cde28a78

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqLVRX3OyQsAhJYUVTx6AflSeqz2jqPB88bYVUCYH5g:tthEVaPqL7nvQlhJYATxDYeHjqPB88ZO

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks