General

  • Target

    003e445ec7e3a973ac6b61b8375e4db13e9ac69a2fb48f3c647571c473eb22c2.exe

  • Size

    757KB

  • Sample

    250205-dvg3eaykbr

  • MD5

    d397a6f50193af8aed6103814f0da716

  • SHA1

    b4e6f18ac33bda5b7fb34018c2201b515b3b6767

  • SHA256

    003e445ec7e3a973ac6b61b8375e4db13e9ac69a2fb48f3c647571c473eb22c2

  • SHA512

    4f544fefad6154ec6b3a2201e3eece47f954fb43d1c0a57c30b30f27bfdf230a5d83c9d8d60b26002f8ced7c990739680e45779b4bd5ebccd250de5454b1e006

  • SSDEEP

    12288:HA9wecl9wdVYU63g6HxeHyxQc2SHgBUdKnriWWG4Kx4aL1cL6hcRNLn:OwexdVY9Q6H8yxQc2MIUExWeWZUczLn

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

Decoy

subur88wap.sbs

tyai1.top

skillbeast.site

kcclassiccars.net

lghomes.net

eijanno.cyou

work-in-usa-60100.bond

268chill.store

bharatwin.biz

cakjitu01.xyz

misafert.xyz

hiretemp.net

lvekz-onearmed.top

amanda-manopo.info

seo-companies22.online

casinowalletth.net

maynrson.monster

bewizi.com

thedronetechhub.shop

car-insurance-93947.bond

Targets

    • Target

      003e445ec7e3a973ac6b61b8375e4db13e9ac69a2fb48f3c647571c473eb22c2.exe

    • Size

      757KB

    • MD5

      d397a6f50193af8aed6103814f0da716

    • SHA1

      b4e6f18ac33bda5b7fb34018c2201b515b3b6767

    • SHA256

      003e445ec7e3a973ac6b61b8375e4db13e9ac69a2fb48f3c647571c473eb22c2

    • SHA512

      4f544fefad6154ec6b3a2201e3eece47f954fb43d1c0a57c30b30f27bfdf230a5d83c9d8d60b26002f8ced7c990739680e45779b4bd5ebccd250de5454b1e006

    • SSDEEP

      12288:HA9wecl9wdVYU63g6HxeHyxQc2SHgBUdKnriWWG4Kx4aL1cL6hcRNLn:OwexdVY9Q6H8yxQc2MIUExWeWZUczLn

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks