General
-
Target
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c
-
Size
831KB
-
Sample
240724-xl1myavdqh
-
MD5
5ca90548bfafebd308ac134e049c334c
-
SHA1
bf538269ba7f53b4bb1ceac79c7a7f296b7e2715
-
SHA256
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c
-
SHA512
eb9592d086a537290263770f5b7edc7f1dc679aaf22dd592763211794cc0433be770ce52b3116a3a9bee9d1846b8c33972a437d6ee73db9d6646c4a16c078f76
-
SSDEEP
24576:v/1zRDvw29GtsBaF0wqlK/qhgT/qLU1GYlafA:vtdw20tP0dlYZ/qLUWfA
Static task
static1
Behavioral task
behavioral1
Sample
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe
Resource
win7-20240705-en
Malware Config
Extracted
formbook
4.1
md02
onsen1508.com
partymaxclubmen36.click
texasshelvingwarehouse.com
tiantiying.com
taxcredits-pr.com
33mgbet.com
equipoleiremnacional.com
andrewghita.com
zbbnp.xyz
englandbreaking.com
a1b5v.xyz
vizamag.com
h0lg3.rest
ux-design-courses-17184.bond
of84.top
qqkartel88v1.com
avalynkate.com
cpuk-finance.com
yeslabs.xyz
webuyandsellpa.com
barnesassetrecovery.store
hecxion.xyz
theopencomputeproject.net
breezyvw.christmas
mumazyl.com
woby.xyz
jalaios10.vip
lynxpire.com
sparkbpo.com
333689z.com
rslotrank.win
adscendmfmarketing.com
detroitreels.com
xojiliv1.com
mzhhxxff.xyz
hitcomply.com
piedge-taiko.net
chiri.lat
bookmygaddi.com
hjemfinesse.shop
zruypj169g.top
solarfundis.com
pittsparking.com
teplo-invest.com
j3k7n.xyz
coloradoskinwellness.com
z8ggd.com
coinbureau.xyz
mamasprinkleofjoy.com
xotj7a.xyz
nijssenadventures.com
ysa-cn.com
tigajco69.fun
localhomeservicesadvisor.com
attorney-services-8344642.zone
rnwaifu.xyz
nyverian.com
family-lawyers-7009103.world
117myw.com
kingdom66.lat
tdshomesolution.com
momof2filiricans.com
saeutah.com
rakring.com
upcyclecharms.com
Targets
-
-
Target
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c
-
Size
831KB
-
MD5
5ca90548bfafebd308ac134e049c334c
-
SHA1
bf538269ba7f53b4bb1ceac79c7a7f296b7e2715
-
SHA256
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c
-
SHA512
eb9592d086a537290263770f5b7edc7f1dc679aaf22dd592763211794cc0433be770ce52b3116a3a9bee9d1846b8c33972a437d6ee73db9d6646c4a16c078f76
-
SSDEEP
24576:v/1zRDvw29GtsBaF0wqlK/qhgT/qLU1GYlafA:vtdw20tP0dlYZ/qLUWfA
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-