Resubmissions

28/03/2025, 01:18

250328-bn2gcszyfy 10

21/02/2022, 14:26

220221-rrw9taaed3 10

General

  • Target

    _BUSAN_HOCHIMINH_FEB.25.exe

  • Size

    738KB

  • Sample

    250328-bn2gcszyfy

  • MD5

    08b4042d2a89ebcff8537ba458295e48

  • SHA1

    91e3fd4718786c523620c31465232113580ea477

  • SHA256

    388292015e4c2d075b935a8299d99335d957e3ad5134a33f28c4dc7f5e3687c5

  • SHA512

    5be0e94d68f8d0599c9323bb4c03635a0e000ff541b9924f6b83eba8adeda55c9528c818093f690249f51cd1976389c77d841e7f373fb1b5d362ba57ea36a222

  • SSDEEP

    12288:dwRl4Zby0chFFQWNd9M/VqnM2GQkTtZrD1fNABd0ioEXZm33h:elIbHchFv6/6TGQk7Ly0aJs

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

a04s

Decoy

lovelyveganfoods.com

wahidi.net

hwcstl.com

psnews.today

depress-elastic.com

r3mixlogistics.com

crimeawartoken.com

changethewayyouseegreen.com

mfa-azubi.com

maximizeprofit.store

alternativesclimat.net

turkcellsuperonline.xyz

extractword.com

radiotec-solutions.com

flawlesscity.com

schatzbenifits.com

gymzf.xyz

runpa.site

cryptocdes.biz

harryhoppe.com

Targets

    • Target

      _BUSAN_HOCHIMINH_FEB.25.exe

    • Size

      738KB

    • MD5

      08b4042d2a89ebcff8537ba458295e48

    • SHA1

      91e3fd4718786c523620c31465232113580ea477

    • SHA256

      388292015e4c2d075b935a8299d99335d957e3ad5134a33f28c4dc7f5e3687c5

    • SHA512

      5be0e94d68f8d0599c9323bb4c03635a0e000ff541b9924f6b83eba8adeda55c9528c818093f690249f51cd1976389c77d841e7f373fb1b5d362ba57ea36a222

    • SSDEEP

      12288:dwRl4Zby0chFFQWNd9M/VqnM2GQkTtZrD1fNABd0ioEXZm33h:elIbHchFv6/6TGQk7Ly0aJs

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • Formbook payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks