General
-
Target
PAYMENT FOR PT1098.exe
-
Size
807KB
-
Sample
221122-kw59ysbd7z
-
MD5
e78a007b4a9befa903f31bc219bcbd75
-
SHA1
c8f9c31c70aa6a20dc7e20a909e23c2672af9014
-
SHA256
5bb96d0e0036475868552414f3645cd7bd779629f1c9ffdbb5da32af26fd641f
-
SHA512
65fd00bf0bfc4a13bef52a98beff89c68859d0fe21477476932ef9a2841f2ba5a3acf69f1ef5766eee2277a8b8cacf36f745c0555c11358bd2c680b68e47259b
-
SSDEEP
24576:Wr18+L74mBfNUstzo38/JY7xki2xTq1r3r8JN:WrO8/JYlDI
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT FOR PT1098.exe
Resource
win7-20220901-en
Malware Config
Extracted
formbook
06eh
LFsv6dX2ii6R8OphWwptZ9Uy+geJcQ==
F2g1Ra3riiwsEeceZ+kPoyzVyQ==
m7+bOE66nh10jg==
Dyb/VMcRh6yNuvVNwJjlrzs=
3yNAvKD3bmuj1Q4=
K7hi/htWsKfW6xc=
sqpSY7/gcvvY0tm0tWucCg==
LnSqfZJAUour0Qo=
Il4dO5W4JE9OlQYNbHc=
LUYTY9QKZHZPe74hTaa/ljM=
Qg6iySJSuuTgNcboVm4=
SJkvGoebIdDEsJn9AI7yPbNK
DKBLqQM7m6oaUKM84/sIFQ==
GOOzpszYDX9lkuZQ5pmdrDDeyg==
V5064wgZl0G1DxNTv5jlrzs=
Onlr5MMHSXuH/91V
oddlSLzpBTyiCAtcvmSS
ITsUV4Gw/mkWaGLjCHs=
HqWBQYO4SQBinnio6GmL
tDrGMY3MC5e1KdgFRw==
0i7Kht0BT9Uwf3Ko6GmL
xc1PYMXwRFdCmgWBBfCEgSI=
1iL/F3SSIKR9Z0OjqWO8QWOK+geJcQ==
Fe+L7lSACifHUJJA
auaHGYTIEaL5HsXyND+MOPMV1w==
WrJQBzNHX3BklQYNbHc=
WoFQ0Lg1eX8=
B2gExP0hRVpFeeP+KEKPDOMo3Q==
r/aKP5/0IlJilwYNbHc=
0BOhje7xbg8CAxJozFyB
LXwZ/dJ9VjmChA==
Y24VOZabw6fW6xc=
6XouwClDudWapQYNbHc=
qTHLXe0VcoJalQYNbHc=
vZt8lnINMtBF
AznPhp06WnORzwo=
Xu64frjiYw0ZXvkcUg==
7b5GpRApq71GlHeo6GmL
Mz4AZ8LFOzi6ZCtLCX8=
klPZKFddlA78DUiPWZjlrzs=
JW9CU629Mc8rZ0q9FgxH3Ge3bdBUN1/N
I505o8nnTe06YRxKfJvBEIeq4Kk=
iUw9iq/LL9NQ
SJVxiR15a/ZY
HYomnwlNVjmChA==
VjoMvzFu22NSUWaTVpjlrzs=
0yjIh+lpo0W0Fx8=
sIwbbLLu/AnqCSRNAYyZGEyA+geJcQ==
4bVHlMPvb+VD6I40j6+c
zxgNrXkB6j6umQ==
+MRimMbkcIVhsRKZQYjd3KZwO6E=
CQrJDnWnBxqFsPclWg==
Vi3XMZKj17PSzMVI
cJUoO3SNAxaEsPclWg==
CVL+tx5SpkSp8/ol7pPyPbNK
4TjYf2axMdZB
rfS/0mKR5oTIrzBONZnpHQ==
/caSDTR5a/ZY
gM032EJYpDdl/MX+RQ==
ePi5nAlFhWuj1Q4=
UVkKDHu1RdGpocgJz0liMPTlu56J
2DbXgd0DC9Q2g26o6GmL
mQ3huhs7ke6byIHj5iBKdSw=
WW8bQboxS1k4lg==
taplan-ms.com
Targets
-
-
Target
PAYMENT FOR PT1098.exe
-
Size
807KB
-
MD5
e78a007b4a9befa903f31bc219bcbd75
-
SHA1
c8f9c31c70aa6a20dc7e20a909e23c2672af9014
-
SHA256
5bb96d0e0036475868552414f3645cd7bd779629f1c9ffdbb5da32af26fd641f
-
SHA512
65fd00bf0bfc4a13bef52a98beff89c68859d0fe21477476932ef9a2841f2ba5a3acf69f1ef5766eee2277a8b8cacf36f745c0555c11358bd2c680b68e47259b
-
SSDEEP
24576:Wr18+L74mBfNUstzo38/JY7xki2xTq1r3r8JN:WrO8/JYlDI
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-