General

  • Target

    40c37a1b79cfcf7f26d43c7f5209cf55.bin

  • Size

    652KB

  • Sample

    241103-bljhrs1akf

  • MD5

    096579eef7cccd19cd56f74c0a05739b

  • SHA1

    9e2c11108f583ba93f231039a714fb271eec0d5a

  • SHA256

    55543057849dbcbeb8e46fabae372b5043deb8cda407c934657972cb7129b6e5

  • SHA512

    6e7dd70d7dd78074aa072a95dcb307ace146814c11c136e94b401435cbdd6afb2a1274681f1b5b616abf3b38926e41ecc7edaafa5ac166a6ae56783595f6a655

  • SSDEEP

    12288:tS/o13Mf/R0GHL+9kHTMknQPDX5UBkz+4q1saaJ7mbGdC:tmoCC2L+2HQkQPz5+34q1PsmbGs

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m17o

Decoy

kzqh72.top

arket-obybqq.xyz

afechoice.click

ote-knplpa.xyz

aqgpie.xyz

orker-ornp.xyz

he-beds321.today

ut-nlvv.xyz

31231827.xyz

milymariephotography.net

wquqo.click

veu-where.xyz

mjcpo-pick.xyz

yself-lpnbdl.xyz

austoowagosha.net

ive-wgag.xyz

lay-drift-palace.xyz

old-vubgv.xyz

ideo-shooting-courses.today

ntendsisaiasjazmin.shop

Targets

    • Target

      dd9e683eba0236ad1ab942e817163a69ed449c17086613b69f5baad174d2c0c5.exe

    • Size

      922KB

    • MD5

      40c37a1b79cfcf7f26d43c7f5209cf55

    • SHA1

      d1bb90106ef39250b294e797a1e23115792d409b

    • SHA256

      dd9e683eba0236ad1ab942e817163a69ed449c17086613b69f5baad174d2c0c5

    • SHA512

      43fd56a4c1692997e491dcc1ad50181a7f38d9a451446721596008b413c6a822da36f8bc7c1336817fb593c93c1d1a2aa5969936606c158e4743a4a03b4cce68

    • SSDEEP

      24576:IKfV7ijKZyXX3Y6jWaowoc2aXsr2gahYG4SeO5:IKfVmjKA3fNrTbuGDeK

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks