General

  • Target

    1eaa86eac4b0e31012c5df0094bbbf2ce39a270baae540d0044de1a7f5226f93.xz

  • Size

    740KB

  • Sample

    240926-blgdeaycjp

  • MD5

    97d4ecb212c224ddc36b8194c05286dd

  • SHA1

    d7c0f0f65b1438f3aad1af9783bd2179237953b1

  • SHA256

    1eaa86eac4b0e31012c5df0094bbbf2ce39a270baae540d0044de1a7f5226f93

  • SHA512

    fedc84a431e0662f616dd6710ec467636bf64a2fa42433e5108b858c315fbfece1eff0e6a015d11601118cf73bf73ba70ee0b982273d88fd177460ad76a2b326

  • SSDEEP

    12288:6G7XzWwmYQlnQOhAydrD54i/jeCe5dRZDl6prl3s7dAtuR6Ofp7E1eYrMCih2F90:ZDW/HhAtTBSZ3scShpw6Vhi+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kmge

Decoy

jia0752d.com

cq0jt.sbs

whimsicalweddingrentals.com

meetsex-here.life

hhe-crv220.com

bedbillionaire.com

soycmo.com

mrawkward.xyz

11ramshornroad.com

motoyonaturals.com

thischicloves.com

gacorbet.pro

ihsanid.com

pancaketurner.com

santanarstore.com

cr3dtv.com

negotools.com

landfillequip.com

sejasuapropriachefe.com

diamant-verkopen.store

Targets

    • Target

      1eaa86eac4b0e31012c5df0094bbbf2ce39a270baae540d0044de1a7f5226f93

    • Size

      1.6MB

    • MD5

      45a4e5d5a6cf73ca933df94dc0717abf

    • SHA1

      17172d6433ca3efc9e0e7aadfb73820c786fa974

    • SHA256

      ed2ac5e893ba48ab637927b1ea3092fa88f0c5ac83125d63c2bf6983f5fe9592

    • SHA512

      316965afa3da625c082d24924c8079e5cf812654b166784c6341623d8e7b98a0733d6629ab2a8d9d4eaa5de1ba964cdaa4477ffb7a5740aa500b8be4a73ab85e

    • SSDEEP

      49152:iAodtaG9kS2U84B+FLan9k5TRM9zl2Vj8HF9nVLn7:G/B1PHFDLn7

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks