General
-
Target
4_6048434599929842876.js
-
Size
9KB
-
Sample
221124-byys8aaa97
-
MD5
f0d8c4e88c78cb534e1bf4df33cd0edf
-
SHA1
56e576823ce200a5d079b245cec26c4e1af71b4b
-
SHA256
392d3c413e8ea60cd0c8ec8876f0ff381aac710dce9ccb7f0f3432117582ee89
-
SHA512
25601825fd6b756aa65f84ab3bbf7f9ed3b953ea77d26b36fbeb91979c3d8abd0f655a9ace4f0510073a890c1fada5bd147a71bca6a563aa01c1dd66d1150082
-
SSDEEP
192:gRwZrQjrWzVD3CxZRfVjl/yzrPKs3RuHLKyJW7X1Kz5uMYICz5uaYzZ46Qz5IaYr:vZQjrWo3/ySa42yYFNaxSr+uai01z7U0
Static task
static1
Behavioral task
behavioral1
Sample
4_6048434599929842876.js
Resource
win7-20221111-en
Malware Config
Extracted
formbook
a3c0
sQND4WdTOlkFZlIDVHk3N6w=
q+EQwUVJu0rqKMvucOA=
nf4X7hV5HnoX
D2GdxSupGqxnbntNXXJp+w==
KoafL5HWwP+dkIBzBGFB5g==
1xVJ44BmoRm3DNlzGHJX
UYqmwE2sg4Vs5dM=
Jo62P3tOy75tHQ==
/GeWSaKPP50rCg==
PZnUga+I0irSgi0Mieg=
Qq3jB6ADzvuvtjaTC2zo8w==
/EuBFH8FGV4K
X77vcuHgVNFutJyPCWj00bya
8G2Ond0wiP7wr1q4
FHaWv/JCjt7Im5NFHnNf
FG2UQcq8nnlv1c4=
WaW7Fh1B8o01AA==
B0prj62IYqtFLyEECFgQ1JKD
LYeyy+6iB2sV
zxVH23VoYL1fYBiGVL62CvZe0A==
UC293dmXc3lv1c4=
b8smSDqF0bhW/r4lnA==
VJebOd0reOWCVU0wUV874g==
JYmoTc3NOKx0Owpu4DGRolkAIJY=
Sbvc8hf6NqZd6Zv8TXk3N6w=
Cul5JkidG1gA
ysdtJkblF2AK
cbfrfZ38w9SHcVk4XXJp+w==
jatZhEF2y75tHQ==
kvcnQ3/TKJ9BCs4fbIU6RbU=
J5HEUdSz9mwPhjma/FG95p9GgRxgUQ==
lPUTG0WW1P+3GgrIM4T3+aoSXRUiE9A=
SKDEX2fnXPGfbjecXXJp+w==
xz5dfM49nb+nqlu6
Ek1ye6mfiGtJeDal
yAg92TO9shTNrBjElA==
bdf1FUyi4SHXBMpzBGFB5g==
aL78EyxruA/wr1q4
ovobuNEtcgDUKCyv
OnqTIFXVwAOiF8vucOA=
N4PC4TKc3Su2rBjElA==
edMyrlV5HnoX
51OFJT2ky75tHQ==
fd0JBEk6dvGbDcvucOA=
SbLliPz8YduD6+HFSnk3N6w=
WbkCLarFRLZzmk6s
GF+nNHnz0vakcWhKXXJp+w==
gdkDHnPtVpCfPcvucOA=
anShOYMENDkWXl4dnA==
10Z0gx6cy75tHQ==
Am6hnQherS7FrBjElA==
3xEkqtmsAXAciHlm10r00bya
4y1iggGJ8FkJIdlzGHJX
oxRFzVAl+S7tOCYFasg/PRqJ8LMApGjxEA==
yiZVV5qYfLxpjEL6YXk3N6w=
CGuWryw3UI5CBcYjnA==
G5W7zhOD7GsQ3cepjt3FQcwfLfxUtNg=
qw8uVXcdP3wU
N7rhcwDj2kX/HdlzGHJX
XMLO5oO17WgA
3i1XaK7JSHsO
eM3uk9xatjz3GdlzGHJX
NnewyRAIUN57rV4LXa6MEdKv7ILigFzsDg==
S0vqCftdy75tHQ==
bidoluyayin.com
Targets
-
-
Target
4_6048434599929842876.js
-
Size
9KB
-
MD5
f0d8c4e88c78cb534e1bf4df33cd0edf
-
SHA1
56e576823ce200a5d079b245cec26c4e1af71b4b
-
SHA256
392d3c413e8ea60cd0c8ec8876f0ff381aac710dce9ccb7f0f3432117582ee89
-
SHA512
25601825fd6b756aa65f84ab3bbf7f9ed3b953ea77d26b36fbeb91979c3d8abd0f655a9ace4f0510073a890c1fada5bd147a71bca6a563aa01c1dd66d1150082
-
SSDEEP
192:gRwZrQjrWzVD3CxZRfVjl/yzrPKs3RuHLKyJW7X1Kz5uMYICz5uaYzZ46Qz5IaYr:vZQjrWo3/ySa42yYFNaxSr+uai01z7U0
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-