General
-
Target
func.exe
-
Size
574KB
-
Sample
210501-8m8enaxlya
-
MD5
b7966509ffcab300d06f0aeb1d1d8533
-
SHA1
2d2f85b7af551e1364b8b6f1a8fa6db1c1a88d5e
-
SHA256
3d0947f988743a495c85b5041d7fe4b8753b7539a4d87e068eeeaddabbf16d1f
-
SHA512
e184a59e66dcdeef5c155a8bf791f2b87daed7758e5429044d9417d6f2bc728f5018be017d7f9eb3c17f3d417dd2a6b5a67f01aa72f189a6e41ebd41da14f060
Static task
static1
Behavioral task
behavioral1
Sample
func.exe
Resource
win7v20210408
Malware Config
Extracted
formbook
4.1
http://www.swim-maki.com/csi/
crazyonlineboutique.com
nelivo.com
chibimama-blog.com
teachersofnyc.com
rare-snare.com
sunriseatlennox.com
innovate-nation.com
mahowebcam.com
foodbyroyalbites.com
nkm580.com
premiumplanterboxes.com
uspaypausa.com
wto2b.com
evoocb.com
missilenttech.com
adtlive.com
guapeco.com
keepfaithful.com
djayhoward.com
cora-designstj.com
furrybasics.com
tabuk24.com
bioshope.online
naturaldesiproducts.com
ardreykellbaseball.com
irisettlement.com
bahama-id.com
lastweektonight.watch
professor-ux.com
lifecompetitions.net
axislnsmail.com
dohannor.com
powertuningfiles.com
analistaweb.net
baascompanies.com
gengkakmona.com
salonandspaexperts.com
mynet.ltd
lionandivy.com
shopalam.com
ana9aty.net
sandostore.com
theasigosysteminfo.com
academiadoaprender.com
akvirtualtours.com
hecoldwithit.com
stopsiba.com
credit780.com
ss01center.com
wristaidmd.com
s2nps.co.uk
kontrey.com
cheesecakedactory.com
bnytechnologies.com
enhancinggrowth.com
gorgeus-girl-full-service.today
bermudesfcrasettlement.com
beste-gruppe.com
lfntv.com
coronarestschuldbefreiung.info
positivechampions.com
roadsigntoday.club
oxytocin.online
bupamwhub.com
Targets
-
-
Target
func.exe
-
Size
574KB
-
MD5
b7966509ffcab300d06f0aeb1d1d8533
-
SHA1
2d2f85b7af551e1364b8b6f1a8fa6db1c1a88d5e
-
SHA256
3d0947f988743a495c85b5041d7fe4b8753b7539a4d87e068eeeaddabbf16d1f
-
SHA512
e184a59e66dcdeef5c155a8bf791f2b87daed7758e5429044d9417d6f2bc728f5018be017d7f9eb3c17f3d417dd2a6b5a67f01aa72f189a6e41ebd41da14f060
-
Formbook Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-