General

  • Target

    4af0929bd0f58119fc1d0a81205f20e32411d76eedca5bc5a3547cb9707a0f50N.exe

  • Size

    743KB

  • Sample

    241129-djgbqs1nat

  • MD5

    b3055c75b563421ec8cc8ec1f4ef8390

  • SHA1

    4414bb16c23fd366404549b06f4d167aa1e86109

  • SHA256

    4af0929bd0f58119fc1d0a81205f20e32411d76eedca5bc5a3547cb9707a0f50

  • SHA512

    0343b4e8940f782839e8173152563397a9c8c6c450f372b02e127b37ac8173209e9843c181556865584bb12abc181895efae4e08a2e48bc2d08e80704f77b545

  • SSDEEP

    12288:wnCb+eCSmttm1P+jXIrBz1HwN2MIKLD4eRV8HenDqfHMHTlsp9byUdOUR0:wuC7tR2XHbMR0UVWfMzlspx9dtR0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hy29

Decoy

obswell.online

etflix.luxury

ulunguwethu.store

ulbcenter.shop

nswering-service-mi-de-tt.click

upport-marketplace84.click

wepxbd163.lat

mplants-doctors.today

aofexf90yj.top

hermodynamic.space

dfg3n489.cyou

off.gay

alkak.cam

ijanarko.net

7tl.site

yaanincma.store

ires-47022.bond

elek4dalt77.xyz

foxsakepeople.online

ndefeatedqs.shop

Targets

    • Target

      4af0929bd0f58119fc1d0a81205f20e32411d76eedca5bc5a3547cb9707a0f50N.exe

    • Size

      743KB

    • MD5

      b3055c75b563421ec8cc8ec1f4ef8390

    • SHA1

      4414bb16c23fd366404549b06f4d167aa1e86109

    • SHA256

      4af0929bd0f58119fc1d0a81205f20e32411d76eedca5bc5a3547cb9707a0f50

    • SHA512

      0343b4e8940f782839e8173152563397a9c8c6c450f372b02e127b37ac8173209e9843c181556865584bb12abc181895efae4e08a2e48bc2d08e80704f77b545

    • SSDEEP

      12288:wnCb+eCSmttm1P+jXIrBz1HwN2MIKLD4eRV8HenDqfHMHTlsp9byUdOUR0:wuC7tR2XHbMR0UVWfMzlspx9dtR0

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks