General

  • Target

    15edc7be3db63aea30a9401469c252f2ed6081e06243f73a9076d68fc58734ee

  • Size

    599KB

  • Sample

    250122-xb7nhazrdn

  • MD5

    6df67a23756a0a6ce3a9b4ce23e377e8

  • SHA1

    74c1eeb7c6cc49d078877698d723053ac52d3f24

  • SHA256

    15edc7be3db63aea30a9401469c252f2ed6081e06243f73a9076d68fc58734ee

  • SHA512

    b73e5c26601c25aee73aa63b0abb31736b04d95d5e94923b8632491d803639bcabccaa96ef8e00874784c24c4808bde07d9c69b8f0c5e517c069884abe7b869b

  • SSDEEP

    12288:KhA6/3jNAmlHHEbKH8sSy9omVY9VquOd40TMdVL5TpTmX:KhF/3jWmcKH8scmqpO2h4X

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g10k

Decoy

utomation-tools-91489.bond

nugandshimmer.store

agazalarburada.net

tockfrenzy.sbs

idrift.net

linds-curtains-49899.bond

armonysupport.net

issa.xyz

emza.xyz

animobilya.xyz

les.fun

uckaeth.vip

urusheasycart.shop

xploring6304.xyz

62288.pro

gencies.team

74411.vip

uxit.online

ailygrowth.xyz

errickmarconi.online

Targets

    • Target

      Order Request.exe

    • Size

      687KB

    • MD5

      58c75c0c7af1046ac9db4f446765f213

    • SHA1

      6409a5dcd59c36fde2cddec428f22286bd4dc3b0

    • SHA256

      b0f1c4f3d4d3dda1a8c8ee81ecbde9a91fa3923058c13ac69dc572193252e0a2

    • SHA512

      e557ae7f1e5d5fb8d5a1cda4b15de2873d1a49d99b41d2a9f5a2da1ab7511dcc6b512180e3dd1cebf42d042efd953edf32960e3ee29aa1957e227da8694a670d

    • SSDEEP

      12288:AlLyWa+k0NoZzDHVZpPpEmRYlNqWQd62TMd5LfyuvGYec:Ok0WZfXkm8LQUbBN

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks