General

  • Target

    17b0a93d47762eaa5fa2f7e88cd664103cf7d106905d3d7a637a21b802481f13.exe

  • Size

    642KB

  • Sample

    241022-bgswmsxflh

  • MD5

    98530c06c4cf0b8cf91fc7491ca9cd67

  • SHA1

    0da058ce55b50735d3d4990b06ac57b02fc71aa0

  • SHA256

    17b0a93d47762eaa5fa2f7e88cd664103cf7d106905d3d7a637a21b802481f13

  • SHA512

    37ccdaa8b93d6d852a140dbcaf4df33bc4928c98ac80b757014c704f3de91689d54de8185c0465ed380fc11c7d48fb93b8fc7a2bab7b6bb7383c8cdc87a1c5a6

  • SSDEEP

    12288:ArkhMOoltiJ/c7eqjJ5tdMFnJgMC9XUKeZ0SMGzkZVlLy/S2lLc26pf9gm:Arkh5oDiJ/cCqjHnLMckpEGzkZVN4c2N

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gy15

Decoy

hairsdeals.today

acob-saaad.buzz

9955.club

gild6222.vip

nline-shopping-56055.bond

lmadulles.top

utemodels.info

ighdd4675.online

nqqkk146.xyz

avasales.online

ortas-de-madeira.today

haad.xyz

races-dental-splints-15439.bond

hilohcreekpemf.online

rrivalgetaways.info

orktoday-2507-02-sap.click

eceriyayinlari.xyz

lsurfer.click

aston-saaae.buzz

etrot.pro

Targets

    • Target

      17b0a93d47762eaa5fa2f7e88cd664103cf7d106905d3d7a637a21b802481f13.exe

    • Size

      642KB

    • MD5

      98530c06c4cf0b8cf91fc7491ca9cd67

    • SHA1

      0da058ce55b50735d3d4990b06ac57b02fc71aa0

    • SHA256

      17b0a93d47762eaa5fa2f7e88cd664103cf7d106905d3d7a637a21b802481f13

    • SHA512

      37ccdaa8b93d6d852a140dbcaf4df33bc4928c98ac80b757014c704f3de91689d54de8185c0465ed380fc11c7d48fb93b8fc7a2bab7b6bb7383c8cdc87a1c5a6

    • SSDEEP

      12288:ArkhMOoltiJ/c7eqjJ5tdMFnJgMC9XUKeZ0SMGzkZVlLy/S2lLc26pf9gm:Arkh5oDiJ/cCqjHnLMckpEGzkZVN4c2N

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks