General

  • Target

    JaffaCakes118_d2653251d5b6a0f202225c89ed8ec66fdf8436db87151d139a5bfe335fe8239a

  • Size

    349KB

  • Sample

    241229-c8b8mszphk

  • MD5

    6045022788038dd74285a4d2ffcee263

  • SHA1

    08d993f1a0058078e8668624983c96e99866c600

  • SHA256

    d2653251d5b6a0f202225c89ed8ec66fdf8436db87151d139a5bfe335fe8239a

  • SHA512

    226a7347cdd851ad8da17c6a49f7652fb2ad630864357ab5365a8b932b3a3873d8a43a04c7ac43826775dc98a77b8f0390f3dfa74b57618d3cb443cacd0e0747

  • SSDEEP

    6144:ebng+0A4W4sNrGZUmTT4sy9xlUDkZMLXkRRc+5I1obVhcnOqMG0E:ebngLW4sxG2mvV8sVLXkRy+4o5hcnOnE

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cx0

Decoy

avtnywveba.club

championmanifesto.com

fuehren.net

smallbusinesshelps.com

langshun168.com

maxonone.com

2commasummit.com

feat.gallery

rgsbc.com

gamefa88vn.pro

dandeliondesignart.com

mksso-real.com

shroomsconnect.com

boscoandthebees.com

payday-loans.space

maryaab-lpc.com

vaaccidentdoctorsnearme.info

ensley1961.com

viilaa.com

paraboliclight.com

Targets

    • Target

      PO # 45347212.exe

    • Size

      429KB

    • MD5

      9d83142b0bdb6f149eca4a5724574c0f

    • SHA1

      126271e8e9084d595bdd9ca65a2de20d0568ba7f

    • SHA256

      97349abd1ac7763287f0d08aab708bb4fe8d02989d5454a5f09f68d62b0995e6

    • SHA512

      100ed5689bca3f17fedc3471e9d4802ca3ca7c71a82f46afc46fea8c1818bc6c344f2372ab80b43cc4b23bbbb95cc2ddd5d883eb57ee11f976b15a554e25870f

    • SSDEEP

      12288:XYtsFABgFW4wxoUmzV8O5b3kRc+4OHhInYXm2Pcg:XEBugxoHzVDb3YDMnmcg

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Modifies Windows Defender Real-time Protection settings

    • Formbook payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks