Resubmissions

13-11-2024 13:51

241113-q52wsatbmp 10

13-11-2024 13:37

241113-qw9v2asfrg 10

13-11-2024 13:20

241113-qlhnsswkcr 10

General

  • Target

    �deme.rar

  • Size

    548KB

  • Sample

    241113-q52wsatbmp

  • MD5

    698a7e5652477449dd7906f65aae2c00

  • SHA1

    a7051cc1b3e0fb1b519a8f51b5a564d28b7aa6fe

  • SHA256

    4e61963f540894706330b3b72d14d125888722f68f3e3786e723c2076ee8e85c

  • SHA512

    4506a581bfbb3fecf96800a7e40c3326ab5709c1d90fa745a33783632bfd78db0f98dda4fa5e7eb9a83d4a5e84661e1ace40238a845e9164777124c731b7be3e

  • SSDEEP

    12288:n/EmFMjA7d/o7+OwKLLs5xSXCTu4540CUGSd0mgctKjF5N:nUuBo6OwoLs5xSyTu4SJAZgc8jFH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m17o

Decoy

kzqh72.top

arket-obybqq.xyz

afechoice.click

ote-knplpa.xyz

aqgpie.xyz

orker-ornp.xyz

he-beds321.today

ut-nlvv.xyz

31231827.xyz

milymariephotography.net

wquqo.click

veu-where.xyz

mjcpo-pick.xyz

yself-lpnbdl.xyz

austoowagosha.net

ive-wgag.xyz

lay-drift-palace.xyz

old-vubgv.xyz

ideo-shooting-courses.today

ntendsisaiasjazmin.shop

Targets

    • Target

      Ödeme.exe

    • Size

      603KB

    • MD5

      dd1fe024a94e2a33b1faa7b03d1c1988

    • SHA1

      315a3c3daf9da89cc8993c85302d0d284f1503ea

    • SHA256

      5181d780e379847bccf22e5cc55b1bdef5c390b78812fb555fb68f042400fd3e

    • SHA512

      185818b975ca406fb9b73f097fbdfd67ee5293f31174a18de22a55310c2f87323d9c2c168651d6fb3169e7587c126b999b8b556a211d56ffef7e52b48ab929ae

    • SSDEEP

      12288:YMyCmE+jjMD0fp77MHyT+XnI2aOkqQr8XSqN714ITNV1oDJIxU:YMyPjMIfxMkgI/1qW8DvBoDmx

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks