General

  • Target

    08112024_0034_07112024_paiement.rar

  • Size

    595KB

  • Sample

    241108-aw81qs1elr

  • MD5

    77d523e7d21dc447a67c2d9abe9d77db

  • SHA1

    58cff2a495059bdeac1cd24f14bd70b7bfae9303

  • SHA256

    c3d817d19a03cd6e2a27e3fdc85d1b87b789b445fd8c4ae3a9a3d62350b8927c

  • SHA512

    93868286c6a1added9266e50a9b388ce7f094ee05da6646632a91e2d584d7f7b6f037dd9bc3d9a53c846f0e2e13221d878b579f92e64e6cf2f6119cb3d1aeda2

  • SSDEEP

    12288:3rJJQt7qGEU3r10gAWigb6/w8hstjBrb/4nY+MUUeEeAiz8bU1wSqpc+:Mtz3IEn8gFrbw9vRd58Yz5+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m17o

Decoy

kzqh72.top

arket-obybqq.xyz

afechoice.click

ote-knplpa.xyz

aqgpie.xyz

orker-ornp.xyz

he-beds321.today

ut-nlvv.xyz

31231827.xyz

milymariephotography.net

wquqo.click

veu-where.xyz

mjcpo-pick.xyz

yself-lpnbdl.xyz

austoowagosha.net

ive-wgag.xyz

lay-drift-palace.xyz

old-vubgv.xyz

ideo-shooting-courses.today

ntendsisaiasjazmin.shop

Targets

    • Target

      paiement.exe

    • Size

      740KB

    • MD5

      3eee9378f53abfa4a0f14bc2b21444f7

    • SHA1

      1d9600e5889c31bd94eef88437d9b6adfcdef930

    • SHA256

      4624ef5fa24a2459eb8c1504e9bdee4e61e762680ee5bc5f2f52c77f197648fe

    • SHA512

      f9a1a943c8f9bde431302a81b4986cfa376ced72fd5510d7f330d653cc00e5523c993a82e774a01db956da7ee311142b4aadd142970ba9bddb10b2af4b934696

    • SSDEEP

      12288:IgWVFxEViHEmbGqdI5UrPcD/YAp99IwxGoq2uYPnV7tqnZxaFYRwySnUKj:lWVFxEAkmNdImLKAA50oIYPnV7mTKySD

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks