General

  • Target

    51d5fbecdf7459fc37ab296b97245a020f31cfd4ac1073f3fb2947a3710a8523.exe

  • Size

    735KB

  • Sample

    250117-ff4zqssmft

  • MD5

    0bf812793c1323caa133810d40983cf3

  • SHA1

    e7e27170e59e951cb025fe6e4c07d61a2575a1de

  • SHA256

    51d5fbecdf7459fc37ab296b97245a020f31cfd4ac1073f3fb2947a3710a8523

  • SHA512

    78c272f76c5790a6533e3e977adf79d113670f2861fbd2fe55ade458e37604ab4ce93fe831ee31fdd500bff8b8763bf7c2a46e4cc6e9b600623393c860ea5b92

  • SSDEEP

    12288:08gWXV7OLzM4Qd5611jY772u41d11hJeZ9PAYg4aYwmuugLpj85nxrNMZ3qtDfFR:pOZMeTPnJeLPngzB0glj89xrNZZnLn

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

Decoy

subur88wap.sbs

tyai1.top

skillbeast.site

kcclassiccars.net

lghomes.net

eijanno.cyou

work-in-usa-60100.bond

268chill.store

bharatwin.biz

cakjitu01.xyz

misafert.xyz

hiretemp.net

lvekz-onearmed.top

amanda-manopo.info

seo-companies22.online

casinowalletth.net

maynrson.monster

bewizi.com

thedronetechhub.shop

car-insurance-93947.bond

Targets

    • Target

      51d5fbecdf7459fc37ab296b97245a020f31cfd4ac1073f3fb2947a3710a8523.exe

    • Size

      735KB

    • MD5

      0bf812793c1323caa133810d40983cf3

    • SHA1

      e7e27170e59e951cb025fe6e4c07d61a2575a1de

    • SHA256

      51d5fbecdf7459fc37ab296b97245a020f31cfd4ac1073f3fb2947a3710a8523

    • SHA512

      78c272f76c5790a6533e3e977adf79d113670f2861fbd2fe55ade458e37604ab4ce93fe831ee31fdd500bff8b8763bf7c2a46e4cc6e9b600623393c860ea5b92

    • SSDEEP

      12288:08gWXV7OLzM4Qd5611jY772u41d11hJeZ9PAYg4aYwmuugLpj85nxrNMZ3qtDfFR:pOZMeTPnJeLPngzB0glj89xrNZZnLn

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks