General

  • Target

    f30ccd8d6bd65a6c172e6233220523d984516e145b06d986bc6c0736e53dfde8.exe

  • Size

    692KB

  • Sample

    250110-rwv8baxjdt

  • MD5

    b7f43cd267dbbf40d9a372dd7ddd121b

  • SHA1

    95f154753e37e45d1020efdd7b9df84bed2393aa

  • SHA256

    f30ccd8d6bd65a6c172e6233220523d984516e145b06d986bc6c0736e53dfde8

  • SHA512

    37036654e6d8df5afc3646b677544bb89d25f2f81fe76945747265927091219dd12152902675ec2a636cf104c198221177eb32a478a9662193ab1ba26fd95de4

  • SSDEEP

    12288:tQpIR4R52J+XtahfgMf9rG2DTgQz1NjiKLacKj4N9GROF1CICoMDPwlYHPkCKPRv:CpIeePhfU2ow7iwacJP5nCoMxI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k49s

Decoy

ufberyrubiest.shop

tpanekatotosite.top

esona805158762.xyz

earing-tests-15487.bond

rediksitiraitoto.xyz

tore-playstore.online

mpresarialpx38.online

ufxusa.net

reativedesigns.lat

leaning-services-47614.bond

959725nptklnq923.top

treziop.xyz

eubel-bestseller.online

uynewcars.xyz

all-panels-74750.bond

erviceninjas.vip

arectoroffice.xyz

oviesgpt.app

ractors-22059.bond

rakenfitness.info

Targets

    • Target

      f30ccd8d6bd65a6c172e6233220523d984516e145b06d986bc6c0736e53dfde8.exe

    • Size

      692KB

    • MD5

      b7f43cd267dbbf40d9a372dd7ddd121b

    • SHA1

      95f154753e37e45d1020efdd7b9df84bed2393aa

    • SHA256

      f30ccd8d6bd65a6c172e6233220523d984516e145b06d986bc6c0736e53dfde8

    • SHA512

      37036654e6d8df5afc3646b677544bb89d25f2f81fe76945747265927091219dd12152902675ec2a636cf104c198221177eb32a478a9662193ab1ba26fd95de4

    • SSDEEP

      12288:tQpIR4R52J+XtahfgMf9rG2DTgQz1NjiKLacKj4N9GROF1CICoMDPwlYHPkCKPRv:CpIeePhfU2ow7iwacJP5nCoMxI

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks