General
-
Target
Scan00516.js
-
Size
2.8MB
-
Sample
230808-mwcnradf21
-
MD5
cceb6f7af35075d52fb1abbbcba9d552
-
SHA1
db1fb42b122d7dfe6870a9a5158cd16a54f500b9
-
SHA256
e65ec8d385c6ce480304b3ef59bcae22c5513e74394d0c4ddea7c3ce61bcc5a9
-
SHA512
694efc7c76eca5a222b811cb4f71cfe914f1206a316db65cbec9e947133f8b047ffb0f86f3f3552e398b4fd6f22ce54f7bb99971d4070ce8eb9a52d1f2cf20a5
-
SSDEEP
12288:HEjhLV6ErrE79GfPIE9bR/Ncojw3Qxe1C5SsPuUhoGp8b+hRmgQeemB7JpPBgKq0:2
Static task
static1
Behavioral task
behavioral1
Sample
Scan00516.js
Resource
win7-20230712-en
Malware Config
Extracted
formbook
4.1
me15
thegrill253.com
arthousecorp.com
acre-com.com
dreambarnhollow.com
winwin220693.online
shinohtrade.com
blockcchain.help
8hx3.vip
lifeshinelearning.com
havencoinvestmentgroup.com
thebesthomehacks.com
the-country-wiki.com
xskt.club
sunrisemedia.space
crecrown.com
0hpail.cyou
artwelding.store
psilome.com
layerbabuena.club
miras.shop
thephdplanner.com
ffbet.city
phoenicianlabshealth.com
sdfikb.xyz
elegantmansion.com
sahajayatra.com
30639.club
spacesfor2.com
kremenergy.com
parkjitter.site
bsjiansuji.com
jeepcause.site
respectify.info
berluscoin.xyz
fathersdaysale.today
xn--ylk-8la7juk.com
vx88.lat
capacitorfaks.com
rekrutmenbumn.com
wheatgrass.expert
firatcelik.shop
transformer.gallery
jbqqb0.boats
longrhombus.com
barbariluxbar.com
zebei01.com
evaluadordemarca.digital
thefirehunter.com
tjela.com
6132023.top
kkutd.club
etihadpaper.com
hn856.vip
departmentfx.com
rmindset.com
signsandfleet.com
myzanzibar.estate
samuelzjenkins.icu
yoixuvniytdm.com
nasswallet.krd
ngtcsh.ink
tinytribecollective.com
360elitemotions.com
mgc0o4.cyou
xiaoao.asia
Extracted
wshrat
http://45.90.222.131:7121
Targets
-
-
Target
Scan00516.js
-
Size
2.8MB
-
MD5
cceb6f7af35075d52fb1abbbcba9d552
-
SHA1
db1fb42b122d7dfe6870a9a5158cd16a54f500b9
-
SHA256
e65ec8d385c6ce480304b3ef59bcae22c5513e74394d0c4ddea7c3ce61bcc5a9
-
SHA512
694efc7c76eca5a222b811cb4f71cfe914f1206a316db65cbec9e947133f8b047ffb0f86f3f3552e398b4fd6f22ce54f7bb99971d4070ce8eb9a52d1f2cf20a5
-
SSDEEP
12288:HEjhLV6ErrE79GfPIE9bR/Ncojw3Qxe1C5SsPuUhoGp8b+hRmgQeemB7JpPBgKq0:2
-
Formbook payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-