General

  • Target

    6cfdfa1de0f031646ee75bde799cb877.bin

  • Size

    622KB

  • Sample

    241214-btjhqstrcq

  • MD5

    b9b802745bf667e25e1197dbffdc2b0b

  • SHA1

    6d430e3563d734152fbea4ed12e06b04e2153fa1

  • SHA256

    a93a12bb8d2cee66ade4a517802d9dec8ae56bb0b4f5da52f9d0cd81a965c332

  • SHA512

    cf41770a0e2ca279523882eebc85563f2122618421940c4538db1c345de8e3eace9b704f2173d5d4b1e81ec27e9f7adfa4b7372d30943599cd3da668f1857d23

  • SSDEEP

    12288:4JubLzcEWaP6V3JeoCvczI21Kr+iqCcU7mlX0gF/WXsPDqtl8wXFp2j89j:14ZaSzenC5XaajsywXFWi

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bc01

Decoy

epatitis-treatment-26155.bond

52cy67sk.bond

nline-degree-6987776.world

ingxingdiandeng-2033.top

mberbreeze.cyou

48xc300mw.autos

obs-for-seniors-39582.bond

tpetersburg-3-tonn.online

egafon-parser.online

172jh.shop

ltraman.pro

bqfhnys.shop

ntercash24-cad.homes

uhtwister.cloud

alk-in-tubs-27353.bond

ucas-saaad.buzz

oko.events

8080713.xyz

refabricated-homes-74404.bond

inaa.boo

Targets

    • Target

      64a8f5c2209bf86e1aa4489fffa5cf93aee6955b0106909345a313de38ad7885.exe

    • Size

      712KB

    • MD5

      6cfdfa1de0f031646ee75bde799cb877

    • SHA1

      6da4c76342858daf1c4e55d537ebfe8b846b87b1

    • SHA256

      64a8f5c2209bf86e1aa4489fffa5cf93aee6955b0106909345a313de38ad7885

    • SHA512

      77acb0a4e390c687d5e4c70c9c4b2f4c6b3e01cd53faf61e3d3e760f126c843ec3a51321d5110796891d0409c3eddbae6cf8653e31c19a77d3f411914ccce72d

    • SSDEEP

      12288:nX5Xt1wWT9YeNqKXO0WTmPUIBdL23sUk/d6nifUmyyDdU/wxSc1GFVeDB:hT9YKXO0fbf16nicsWoxS

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks