General
-
Target
EKSTRE.exe
-
Size
214KB
-
Sample
221027-nr99wscael
-
MD5
36089a492ec3710e15a4b5a0261d249b
-
SHA1
75e9a0c4ca67ddd2c21353e03a2d80881aca3bc4
-
SHA256
9469fcaa1fdedbca5dea10fbc8908e549bd80111eebeb817b1f74d6355fdff66
-
SHA512
834192c31bdbfa43ac8cc32df9911e6aa3854b1a14615f6176b3fbe89298a10367d128a2fb0edb0e81bdb4fcd47fb57f7c3e2d8ae1502bb5d201787d2f8cf5b0
-
SSDEEP
6144:qweEpm/FpVprq8ELucHE4VS08uIaijEeHd:bQzqikTnbiQ8
Static task
static1
Behavioral task
behavioral1
Sample
EKSTRE.exe
Resource
win7-20220901-en
Malware Config
Extracted
formbook
4.1
et02
floppa.art
mdesign.solutions
rus8.top
pleasantvilleenclave.com
schweitzervacation.rentals
yaolibeautyme.com
the20-sa.com
hifuel.info
meadowsweetwater.com
squamouscellcarcinoma.site
buildingblmt.com
saberfund.online
letyourstorytalk.com
neinagordon.com
turing.buzz
bouldercityhandyman.net
gethub.online
404wellesleycourt.com
squezpop.com
doublesranch.net
lighttheshadows.com
ky7229.com
1316rolfelane.com
cybercops.store
apachemasonry.com
texaspolling.online
zuiakon.xyz
gfak-consult.store
sharkcodersspain.com
greinerproperties.net
ren111.top
questgg.com
giuila.site
groupable.net
rebirth0527.xyz
bradentonroofingcontractors.com
aroma24.top
alexxgold.com
trabzonozalit.online
muslimsufi.com
highroadgrants.site
mrnoche.space
salutaris-store.com
takarpine.online
highenergyquiz.com
fvqk.net
buldanplajelbiseleri.site
birkenstock.biz
colourstattoo.online
dolarslot88.quest
gqimw.click
emaginproject.info
heyspend.com
surveillancecolorado.com
ipko-biznes.net
ky1341.com
schmocker.tech
highroadcoin.site
resetdog.com
swiperrclean.store
castonguay.info
htzqlt.club
abcgpdfsdfsdfs.website
iifydf.click
hzllaw.com
Targets
-
-
Target
EKSTRE.exe
-
Size
214KB
-
MD5
36089a492ec3710e15a4b5a0261d249b
-
SHA1
75e9a0c4ca67ddd2c21353e03a2d80881aca3bc4
-
SHA256
9469fcaa1fdedbca5dea10fbc8908e549bd80111eebeb817b1f74d6355fdff66
-
SHA512
834192c31bdbfa43ac8cc32df9911e6aa3854b1a14615f6176b3fbe89298a10367d128a2fb0edb0e81bdb4fcd47fb57f7c3e2d8ae1502bb5d201787d2f8cf5b0
-
SSDEEP
6144:qweEpm/FpVprq8ELucHE4VS08uIaijEeHd:bQzqikTnbiQ8
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-