General

  • Target

    attached PO.exe

  • Size

    687KB

  • Sample

    250122-qy359symgw

  • MD5

    58c75c0c7af1046ac9db4f446765f213

  • SHA1

    6409a5dcd59c36fde2cddec428f22286bd4dc3b0

  • SHA256

    b0f1c4f3d4d3dda1a8c8ee81ecbde9a91fa3923058c13ac69dc572193252e0a2

  • SHA512

    e557ae7f1e5d5fb8d5a1cda4b15de2873d1a49d99b41d2a9f5a2da1ab7511dcc6b512180e3dd1cebf42d042efd953edf32960e3ee29aa1957e227da8694a670d

  • SSDEEP

    12288:AlLyWa+k0NoZzDHVZpPpEmRYlNqWQd62TMd5LfyuvGYec:Ok0WZfXkm8LQUbBN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g10k

Decoy

utomation-tools-91489.bond

nugandshimmer.store

agazalarburada.net

tockfrenzy.sbs

idrift.net

linds-curtains-49899.bond

armonysupport.net

issa.xyz

emza.xyz

animobilya.xyz

les.fun

uckaeth.vip

urusheasycart.shop

xploring6304.xyz

62288.pro

gencies.team

74411.vip

uxit.online

ailygrowth.xyz

errickmarconi.online

Targets

    • Target

      attached PO.exe

    • Size

      687KB

    • MD5

      58c75c0c7af1046ac9db4f446765f213

    • SHA1

      6409a5dcd59c36fde2cddec428f22286bd4dc3b0

    • SHA256

      b0f1c4f3d4d3dda1a8c8ee81ecbde9a91fa3923058c13ac69dc572193252e0a2

    • SHA512

      e557ae7f1e5d5fb8d5a1cda4b15de2873d1a49d99b41d2a9f5a2da1ab7511dcc6b512180e3dd1cebf42d042efd953edf32960e3ee29aa1957e227da8694a670d

    • SSDEEP

      12288:AlLyWa+k0NoZzDHVZpPpEmRYlNqWQd62TMd5LfyuvGYec:Ok0WZfXkm8LQUbBN

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks