General

  • Target

    JaffaCakes118_4c7d13f022c276f0e8d38393d2a861c14d401258797a48fcd01a9c55f69e4a19

  • Size

    494KB

  • Sample

    241221-1lt2yazqhx

  • MD5

    a6c1d970fae0fb2a52840e71ae2a9628

  • SHA1

    0af3d26b8fb2ec00321e24b06ece1b9af9dbd11f

  • SHA256

    4c7d13f022c276f0e8d38393d2a861c14d401258797a48fcd01a9c55f69e4a19

  • SHA512

    38d0c8b584a2b1a5f76e95bdeb1b2ca50d62a4b3e936a585294009628c956fe32a1d3c97ef6313c9dfd9e02224d986afe4abd5d4bcda945f34ab048073a9b754

  • SSDEEP

    12288:66f7UFfaJuONjfdiJHKi+uCbz/vGWtX2q2s:smuIrIpSz2WtX2q2s

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o27j

Decoy

jimchim.club

aerovistasllc.com

gpdy5-zxs4j-8-ee.xyz

ilzro.tech

tesringnyc.com

dubulk.com

humiservice.com

torrentpa.com

kiralikbahisayfalari.com

tokoporn.xyz

pihgos.xyz

ultimateguirtar.com

awanpetir.com

mywafflehelps.com

synergy.cfd

spatialdraftingsolutions.com

psmf.xyz

jazzontime.com

blns-law.com

more2moors.com

Targets

    • Target

      a3d145e3c72db7ea3e18a306410a0445222a8ce83235794dc404dd470843caf2

    • Size

      771KB

    • MD5

      061af339cbf1835f53f9b84ff1c49c21

    • SHA1

      7da36c353e199e2c097233653d48b26ae3de0c43

    • SHA256

      a3d145e3c72db7ea3e18a306410a0445222a8ce83235794dc404dd470843caf2

    • SHA512

      ba657afd8c62539d93f696fcc0a2c0ea4315f5172592cdddbf9aae9f686d8193bad5a6419fd50d08df5fdb537f9ebaf3a5f61261f822b67f76695d0bf2dd9f42

    • SSDEEP

      12288:4X3bbJTSjkURroDEor+HXtqbL2cikjfCYV:k3RInyysbL2cr

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks