General
-
Target
newPO.js
-
Size
4KB
-
Sample
221025-kk236acad8
-
MD5
3ea1401952fe7004973360bbe4aec8b9
-
SHA1
240dba7f04a06cfc7d23bfcc01f58184f5b432b6
-
SHA256
e31e2c584e256194d62b34964c668413b6db5c95f4ab95db89d80d4df7c15188
-
SHA512
d0a41702288c7e01c863d2e975b0d15a7072266f2e2afda87a7ced76c3f56fb70e63ad6b530860650e12f2ed8e3000a1b9e1329454e4ff1ef25c0cb3a10ff62a
-
SSDEEP
96:NxzcwV39M1Cxfc6PMpotxNAkR2mAzvs/GhWMHduUAp7UoLMY2wH85k4GkcKA6X:fzcwFG1W06PMpaxNA0Uzvs8uUc7UXCWt
Static task
static1
Behavioral task
behavioral1
Sample
newPO.js
Resource
win7-20220812-en
Malware Config
Extracted
formbook
4.1
zx85
myclassly.com
rilcon.xyz
miracleun.shop
gadgetward-usa.com
farmaacademy.com
dreamsolutions.group
fffood.online
ziggnl.site
cherpol.com
imprescriptible-tienoscope.biz
yztc.fun
chicagonftweek.com
zz0659.com
hznaixi.com
027-seo.net
korlekded.com
gelatoitaly.com
finlitguru.com
gupingapp.com
manmakecoffee.com
yuanwei.lol
cargovoyager.com
getjobzz.com
dagatructiephd.com
mynab.mobi
masteralbert.com
rtugwmt0cs.vip
uscanvas.net
nocrytech.com
canadaroi.com
archivegamer.com
crossinspectionservices.com
dxxws.com
rufflyfedogtraining.com
prgrn.dev
bwdcourses.com
criptomexico.com
elisabethingram.online
drationa.shop
pulsarthermalscope.shop
grcpp8vyuk.vip
sh-whyyl.com
in-cdn.xyz
aquatabdouro.online
handsomeshooterjewelry.com
erug.store
trueimpact.studio
taskalso.com
dzslqdz.xyz
barbushing.com
freightxpert.com
777703.xyz
bradysproducts.com
teensforcp.site
gpssystemecuador.com
luxslides.com
sony8ktv.monster
baxiservisim.xyz
lojascacau.com
sfanci.com
magdrade.com
jobreadyfresher.com
dori-maniacs.com
mercydm.mobi
ept-egy.com
Targets
-
-
Target
newPO.js
-
Size
4KB
-
MD5
3ea1401952fe7004973360bbe4aec8b9
-
SHA1
240dba7f04a06cfc7d23bfcc01f58184f5b432b6
-
SHA256
e31e2c584e256194d62b34964c668413b6db5c95f4ab95db89d80d4df7c15188
-
SHA512
d0a41702288c7e01c863d2e975b0d15a7072266f2e2afda87a7ced76c3f56fb70e63ad6b530860650e12f2ed8e3000a1b9e1329454e4ff1ef25c0cb3a10ff62a
-
SSDEEP
96:NxzcwV39M1Cxfc6PMpotxNAkR2mAzvs/GhWMHduUAp7UoLMY2wH85k4GkcKA6X:fzcwFG1W06PMpaxNA0Uzvs8uUc7UXCWt
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-