General

  • Target

    tnbws7pyQvMUSjF.exe

  • Size

    731KB

  • Sample

    241007-j4ge5avepr

  • MD5

    17a1259bd9c1cb80ac8d105d513bed7f

  • SHA1

    cae2ad2f6a8055ad2145e25324d29033fe1133ae

  • SHA256

    03b5cfab3f0ffdf96e415006004be9a0c05e6365e1d5834984cfd5cea9df85fe

  • SHA512

    f3edf3d6e0c10fd71e411c78fc7af1db10c0c4d56cc796dac113eae2afe96ff30eceb4d0c275a48bded4aeeb353e1a6d22f19f754baf1fd218b8fdaa63ff12b0

  • SSDEEP

    12288:XTrw1bZZn9LJ/x0NHhVdAU/ocoHqXNAN5sNUEj+CQBuxXF29cGNzw1ZW6bEm7N52:DrwLZnR30xhDLocIqXN8u+CQ0FJGVuZN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t18n

Decoy

tmusicoregon.net

atici.online

j7u7.xyz

iewunucierwuerwnziqi1.info

ruvabetgiris.website

acik.lat

obsk.top

sphaltpaving-ttp1-shd-us-2.shop

ispensarynearme.news

b3nd.bond

urelook.xyz

gearlpfbm.top

aconstructionjob.bond

killsnexis.info

oshon.xyz

ashabsxw.top

ussiatraiding.buzz

raipsehumus.homes

6ae23rx.forum

edar88vvip.shop

Targets

    • Target

      tnbws7pyQvMUSjF.exe

    • Size

      731KB

    • MD5

      17a1259bd9c1cb80ac8d105d513bed7f

    • SHA1

      cae2ad2f6a8055ad2145e25324d29033fe1133ae

    • SHA256

      03b5cfab3f0ffdf96e415006004be9a0c05e6365e1d5834984cfd5cea9df85fe

    • SHA512

      f3edf3d6e0c10fd71e411c78fc7af1db10c0c4d56cc796dac113eae2afe96ff30eceb4d0c275a48bded4aeeb353e1a6d22f19f754baf1fd218b8fdaa63ff12b0

    • SSDEEP

      12288:XTrw1bZZn9LJ/x0NHhVdAU/ocoHqXNAN5sNUEj+CQBuxXF29cGNzw1ZW6bEm7N52:DrwLZnR30xhDLocIqXN8u+CQ0FJGVuZN

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks