General
-
Target
copie de plata bancara.exe
-
Size
903KB
-
Sample
220316-jtv6jahbfk
-
MD5
d35d30f184393cacc394b8c51743348d
-
SHA1
961b5905a6d86a0f98b7f14a481c2f2ebebace3b
-
SHA256
3d5d161635b1d409b28564bb95c9006687b720caa5bfb6ed8679b87e889baf3a
-
SHA512
aebf1d8771f475d28c57a709aaf3377a38b540221be3ef4fe6d0bbac8ebc20a8553e26cfae6532c38043e75079c4f5da37d586f6e96755f2d84af594d09d4119
Static task
static1
Behavioral task
behavioral1
Sample
copie de plata bancara.exe
Resource
win7-20220311-en
Malware Config
Extracted
formbook
4.1
3nop
videohm.com
panache-rose.com
alnooncars-kw.com
trueblue2u.com
brussels-cafe.com
ip2c.net
influenzerr.com
rbcoq.com
zzful.com
drainthe.com
sumaholesson.com
cursosaprovados.com
genotecinc.com
dbrulhart.com
theapiarystudios.com
kensyu-kan.com
dkku88.com
tikhyper.com
aztecnort.com
homebrim.com
infinitilamp.com
leelegantflower.com
floor-space.investments
vidasustentavel.online
wholehearteddaughters.com
vipandeep.com
mdwovzrrm.icu
592215.com
academicplumbing.com
bestveganbook.com
theservantleader.com
nazarickdeveloper.xyz
delta-wing.com
girlfriendsgarb.com
sezyz11.com
ca3construction.com
smartswitchhomeloan.net
luckytwo.agency
ministry-of-barbers.com
babbageacademy.com
informationside.com
packapp.net
spacecoasthondaevent.com
thehealthyimmunereset.com
pjcavaliere.info
trebdurham.com
zhixintonghe.com
gon2580.com
dottproject.net
snakby.com
keeponsports.com
debbiewilsondesigns.com
stagingsolutionsgroup.com
forummondialdelamerbizerte.com
garnier.red
tempestchs.com
zpxinxi.com
jam-nins.com
inclusiocg.com
msmenders.com
whachupichu.com
pursemore.com
thebusinessfitclub.com
scootgotti.com
jakesplacebarbers.com
Targets
-
-
Target
copie de plata bancara.exe
-
Size
903KB
-
MD5
d35d30f184393cacc394b8c51743348d
-
SHA1
961b5905a6d86a0f98b7f14a481c2f2ebebace3b
-
SHA256
3d5d161635b1d409b28564bb95c9006687b720caa5bfb6ed8679b87e889baf3a
-
SHA512
aebf1d8771f475d28c57a709aaf3377a38b540221be3ef4fe6d0bbac8ebc20a8553e26cfae6532c38043e75079c4f5da37d586f6e96755f2d84af594d09d4119
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-