General

  • Target

    31e7559f21054aca8a1cd2287e322f22e03ac6cbc84e1265c8ac1a3367403989.exe

  • Size

    664KB

  • Sample

    250115-cwm5daxnbw

  • MD5

    ad5806ffe238ea11606d3ee49b28c655

  • SHA1

    953393b81ec159e23c16459681820317f2f63d18

  • SHA256

    31e7559f21054aca8a1cd2287e322f22e03ac6cbc84e1265c8ac1a3367403989

  • SHA512

    8c2829ad04e922b5d2f67f3e2eef2bae4dd315ea18af11a5ce80074bedeaa4c5046db5d568fa81179ed00ca80c5130a4e9230b3236803dc8c61a12429d6d079f

  • SSDEEP

    12288:Gf6YRxA4Y5lyA/BxSPCR7v7w4+UdUQCqZqGvwpfWySsV7cz7Ha8cAB2RZ+B7c:QRobk4+QDCqZqwwpOCVi5cb07c

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

a03d

Decoy

nfluencer-marketing-13524.bond

cebepu.info

lphatechblog.xyz

haoyun.website

itiz.xyz

orld-visa-center.online

si.art

alata.xyz

mmarketing.xyz

elnqdjc.shop

ensentoto.cloud

voyagu.info

onvert.today

1fuli9902.shop

otelhafnia.info

rumpchiefofstaff.store

urvivalflashlights.shop

0090.pizza

ings-hu-13.today

oliticalpatriot.net

Targets

    • Target

      31e7559f21054aca8a1cd2287e322f22e03ac6cbc84e1265c8ac1a3367403989.exe

    • Size

      664KB

    • MD5

      ad5806ffe238ea11606d3ee49b28c655

    • SHA1

      953393b81ec159e23c16459681820317f2f63d18

    • SHA256

      31e7559f21054aca8a1cd2287e322f22e03ac6cbc84e1265c8ac1a3367403989

    • SHA512

      8c2829ad04e922b5d2f67f3e2eef2bae4dd315ea18af11a5ce80074bedeaa4c5046db5d568fa81179ed00ca80c5130a4e9230b3236803dc8c61a12429d6d079f

    • SSDEEP

      12288:Gf6YRxA4Y5lyA/BxSPCR7v7w4+UdUQCqZqGvwpfWySsV7cz7Ha8cAB2RZ+B7c:QRobk4+QDCqZqwwpOCVi5cb07c

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks