General
-
Target
Scan005510.js
-
Size
5.3MB
-
Sample
230718-qc774abc71
-
MD5
dcdd70327905af1b3bee089b4f47a343
-
SHA1
fc26fd4b71a7d6f94d191eca8ad1e4303a679075
-
SHA256
58f1b6a6931817eaef17e92901372bc6032dd0e6aa0636f82c7b3176c1ded8ea
-
SHA512
befa67677050ae06352e55fbaefb7287ff88b1428eafa1cc63342339e358081b6b0e3fb98473906ee64bca28314c981fa98c70fcd94383da0d95d8d92b9f38ef
-
SSDEEP
6144:XgHrlNOv7uIeLpJMaO/lfSiSiV/r3ZPuK/v4lOVdMorRpVDBqP3nvBrXQklUOu6z:iPB
Static task
static1
Behavioral task
behavioral1
Sample
Scan005510.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Scan005510.js
Resource
win10v2004-20230703-en
Malware Config
Extracted
wshrat
http://45.90.222.131:7121
Extracted
formbook
4.1
me15
thegrill253.com
arthousecorp.com
acre-com.com
dreambarnhollow.com
winwin220693.online
shinohtrade.com
blockcchain.help
8hx3.vip
lifeshinelearning.com
havencoinvestmentgroup.com
thebesthomehacks.com
the-country-wiki.com
xskt.club
sunrisemedia.space
crecrown.com
0hpail.cyou
artwelding.store
psilome.com
layerbabuena.club
miras.shop
thephdplanner.com
ffbet.city
phoenicianlabshealth.com
sdfikb.xyz
elegantmansion.com
sahajayatra.com
30639.club
spacesfor2.com
kremenergy.com
parkjitter.site
bsjiansuji.com
jeepcause.site
respectify.info
berluscoin.xyz
fathersdaysale.today
xn--ylk-8la7juk.com
vx88.lat
capacitorfaks.com
rekrutmenbumn.com
wheatgrass.expert
firatcelik.shop
transformer.gallery
jbqqb0.boats
longrhombus.com
barbariluxbar.com
zebei01.com
evaluadordemarca.digital
thefirehunter.com
tjela.com
6132023.top
kkutd.club
etihadpaper.com
hn856.vip
departmentfx.com
rmindset.com
signsandfleet.com
myzanzibar.estate
samuelzjenkins.icu
yoixuvniytdm.com
nasswallet.krd
ngtcsh.ink
tinytribecollective.com
360elitemotions.com
mgc0o4.cyou
xiaoao.asia
Targets
-
-
Target
Scan005510.js
-
Size
5.3MB
-
MD5
dcdd70327905af1b3bee089b4f47a343
-
SHA1
fc26fd4b71a7d6f94d191eca8ad1e4303a679075
-
SHA256
58f1b6a6931817eaef17e92901372bc6032dd0e6aa0636f82c7b3176c1ded8ea
-
SHA512
befa67677050ae06352e55fbaefb7287ff88b1428eafa1cc63342339e358081b6b0e3fb98473906ee64bca28314c981fa98c70fcd94383da0d95d8d92b9f38ef
-
SSDEEP
6144:XgHrlNOv7uIeLpJMaO/lfSiSiV/r3ZPuK/v4lOVdMorRpVDBqP3nvBrXQklUOu6z:iPB
-
Formbook payload
-
Blocklisted process makes network request
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-