General
-
Target
GXB032199034.js
-
Size
2.7MB
-
Sample
230808-gj6heacd4v
-
MD5
528d4b33434e3c8ce689f137dba1c894
-
SHA1
09cf5206b5b80e2cf130a313699cd50f3d62709d
-
SHA256
9406c764fa44815b3cb4c105f2cc051dd2e764086ec7df66e49992e5c9681f01
-
SHA512
706251e9e9dd62b30268f4a9c0888de390d201ae4af0b0725358efe4399db2404e850195678495b857d66a76a831a65849f04a6cc7b28735a42b5a04e8604486
-
SSDEEP
6144:STNgGWMXjQS3H1WfCovS9TuaDqFBpgU5MXZDJ+5svwXJ6ho1LpEieK4W2WxzD2pi:qtid
Static task
static1
Behavioral task
behavioral1
Sample
GXB032199034.js
Resource
win7-20230712-en
Malware Config
Extracted
formbook
4.1
me15
thegrill253.com
arthousecorp.com
acre-com.com
dreambarnhollow.com
winwin220693.online
shinohtrade.com
blockcchain.help
8hx3.vip
lifeshinelearning.com
havencoinvestmentgroup.com
thebesthomehacks.com
the-country-wiki.com
xskt.club
sunrisemedia.space
crecrown.com
0hpail.cyou
artwelding.store
psilome.com
layerbabuena.club
miras.shop
thephdplanner.com
ffbet.city
phoenicianlabshealth.com
sdfikb.xyz
elegantmansion.com
sahajayatra.com
30639.club
spacesfor2.com
kremenergy.com
parkjitter.site
bsjiansuji.com
jeepcause.site
respectify.info
berluscoin.xyz
fathersdaysale.today
xn--ylk-8la7juk.com
vx88.lat
capacitorfaks.com
rekrutmenbumn.com
wheatgrass.expert
firatcelik.shop
transformer.gallery
jbqqb0.boats
longrhombus.com
barbariluxbar.com
zebei01.com
evaluadordemarca.digital
thefirehunter.com
tjela.com
6132023.top
kkutd.club
etihadpaper.com
hn856.vip
departmentfx.com
rmindset.com
signsandfleet.com
myzanzibar.estate
samuelzjenkins.icu
yoixuvniytdm.com
nasswallet.krd
ngtcsh.ink
tinytribecollective.com
360elitemotions.com
mgc0o4.cyou
xiaoao.asia
Extracted
wshrat
http://45.90.222.131:7121
Targets
-
-
Target
GXB032199034.js
-
Size
2.7MB
-
MD5
528d4b33434e3c8ce689f137dba1c894
-
SHA1
09cf5206b5b80e2cf130a313699cd50f3d62709d
-
SHA256
9406c764fa44815b3cb4c105f2cc051dd2e764086ec7df66e49992e5c9681f01
-
SHA512
706251e9e9dd62b30268f4a9c0888de390d201ae4af0b0725358efe4399db2404e850195678495b857d66a76a831a65849f04a6cc7b28735a42b5a04e8604486
-
SSDEEP
6144:STNgGWMXjQS3H1WfCovS9TuaDqFBpgU5MXZDJ+5svwXJ6ho1LpEieK4W2WxzD2pi:qtid
-
Formbook payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-