General
-
Target
FT - 20221202.exe
-
Size
257KB
-
Sample
221202-mpevjahe64
-
MD5
48761a585f2cb5ffa54ef767bb18abdb
-
SHA1
71483ebc4e70dfee81e108c38522a4f915b19600
-
SHA256
6edd37fb895163628297cdcf7898da03027b960434bcae3404cd9fec27de1012
-
SHA512
2594db7912073a8a69b632efd832eb800519a87af1045816ee4735d650ea410156c9cab93cc7ee8b6e06994bdd2f4fad62fafcbac399dc92a9fcba3af4ffa284
-
SSDEEP
6144:QBn1PrZO0xliJYVYpu0OSmzleoJuou5KjfByDdDC0U0:gz40xkVu0BoSKdiCN0
Static task
static1
Behavioral task
behavioral1
Sample
FT - 20221202.exe
Resource
win7-20220812-en
Malware Config
Extracted
formbook
4.1
b31b
deltafxtrading.com
alisonangl.com
cdfqs.com
easyentry.vip
dentalinfodomain.com
hiphoppianyc.com
pools-62911.com
supportteam26589.site
delldaypa.one
szanody.com
diaper-basket.art
ffscollab.com
freediverconnect.com
namesbrun.com
theprimone.top
lenzolab.com
cikmas.com
genyuei-no.space
hellofstyle.com
lamagall.com
hallmarktb.com
hifebou7.info
sex5a.finance
printrynner.com
powerrestorationllc.com
hirefiz.com
uninvitedempire.com
alpinemaintenance.online
ppcadshub.com
looking4.tours
dirtyhandsmedia.com
capishe.website
cachorrospitbull.com
mythic-authentication.online
nordingcave.online
gremep.online
tryufabetcasino.com
premiumciso.com
powerful70s.com
myminecraftrealm.com
bssurgery.com
steel-pcint.com
iokailyjewelry.com
barmanon5.pro
kcrsw.com
9393xx38.app
kochen-mit-induktion.com
indtradors.store
giaxevn.info
trungtambaohanhariston.com
fulili.com
crgabions.com
matomekoubou.com
duaidapduapjdp.site
invissiblefriends.com
cy3.space
idqoft.com
jamal53153.com
lemagnetix.com
anthroaction.com
uspcff.top
supplierdir.com
counterpoint.online
zarl.tech
cdlcapitolsolutions.com
Targets
-
-
Target
FT - 20221202.exe
-
Size
257KB
-
MD5
48761a585f2cb5ffa54ef767bb18abdb
-
SHA1
71483ebc4e70dfee81e108c38522a4f915b19600
-
SHA256
6edd37fb895163628297cdcf7898da03027b960434bcae3404cd9fec27de1012
-
SHA512
2594db7912073a8a69b632efd832eb800519a87af1045816ee4735d650ea410156c9cab93cc7ee8b6e06994bdd2f4fad62fafcbac399dc92a9fcba3af4ffa284
-
SSDEEP
6144:QBn1PrZO0xliJYVYpu0OSmzleoJuou5KjfByDdDC0U0:gz40xkVu0BoSKdiCN0
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-