General

  • Target

    3.exe

  • Size

    764KB

  • Sample

    241009-ly721axarn

  • MD5

    9720f4191c1a08e6297cebeef23aafbc

  • SHA1

    d1bdf37d7ed47dcc57e05eabd6f814a4efec7483

  • SHA256

    0460b13245e1675310035b772097a9c7f459f00a90ed1b368761ed6553abc009

  • SHA512

    0cc30eaa5f7cb5022d4b0c7f4ebeb12efe21166daa6704664f11736b4ae5c103d6e3537ab4f6bf31f8d4616676e755fe386d7a4a57ee7dd7a7fb9948df76506a

  • SSDEEP

    12288:I1atsD16mMUbmHoTt+I2FQgTWxvHpvG1x2BYZjmEovkR:LiD16xMmIToQGOHFG1cBgiET

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c24t

Decoy

ealthbridgeccs.online

ngelicais.art

uktuksu1.sbs

fapoker.asia

hecreature.tech

orenzoplaybest14.xyz

op-smartphones-deal.today

delark.click

7395.asia

otnews.cfd

j16e.xyz

oko.events

fscxb.top

roudtxliberals.vote

asas-br.bond

ourhealthyourlife.shop

fbpd.top

j9u9.xyz

uijiuw.top

aming-chair-37588.bond

Targets

    • Target

      3.exe

    • Size

      764KB

    • MD5

      9720f4191c1a08e6297cebeef23aafbc

    • SHA1

      d1bdf37d7ed47dcc57e05eabd6f814a4efec7483

    • SHA256

      0460b13245e1675310035b772097a9c7f459f00a90ed1b368761ed6553abc009

    • SHA512

      0cc30eaa5f7cb5022d4b0c7f4ebeb12efe21166daa6704664f11736b4ae5c103d6e3537ab4f6bf31f8d4616676e755fe386d7a4a57ee7dd7a7fb9948df76506a

    • SSDEEP

      12288:I1atsD16mMUbmHoTt+I2FQgTWxvHpvG1x2BYZjmEovkR:LiD16xMmIToQGOHFG1cBgiET

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks