General
-
Target
MalwareBazaar.4
-
Size
810KB
-
Sample
240731-k2zz5axbnq
-
MD5
60bd782aa615ee9354c2221b4ad7b80c
-
SHA1
f753f3c3c359b38c1051064417d6d0daf89db2c9
-
SHA256
62ca1c39badbfbc52c6301cb69c8356977db57656c6d98dac7e4ab908753af00
-
SHA512
0ddc9c16ac39aa6c006bd8ccd11194267b73d646b304f84b911153832dc7a6c960d60ebfc08d0d6314630e124e575bee4c81c75ffa7915faddaeae5d37b351e3
-
SSDEEP
12288:1y9WilQDz/bhj+nm3m6SsWCG0tP+KpIMD5w2T7S+w74fNJ658N:1wQDfhj+um6SgDEWHPdL65
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240705-en
Malware Config
Extracted
formbook
4.1
rn10
kedai168et.com
mental-olympics.com
pussybuildsstrongbones.net
857691.shop
hisellers.net
exposurecophotography.com
beaded-boutique.net
wednesdayholdings.com
plesacv.xyz
manonlineros.com
a0204.shop
333689g.com
dyprl716h.xyz
pulseirabet.com
fnet.work
bo-2024-001-v1-d1.xyz
ongaurdsecurity.com
giulianacristini.com
miladamani.com
magicalrealmshopkeeper.online
dy62i.com
pfjxhzz.com
yieks.voto
wallseason.com
kclsec.xyz
findwineinspace.com
everydayoptics.com
pg15.top
schody.net
82647351.com
fluteindia.com
infominer.club
kedai168el.com
compuglobalhypermeganet.app
designs-by-syn.com
godmachines.net
play-fortuna-ahf.buzz
lyjxk.com
waysfundraising.online
topuptalkmore.com
jingalraid.cfd
stonebahis411.com
adonicfuran.xyz
5z1lcnbm.fun
ignitorite.com
375bey.xyz
oloutlets.com
jn66-com-opqrst99988.com
xins.live
buchstabieralphabet.info
sfazzino.com
facai86.xyz
rapidsignsystems.com
golightresins.com
fpsportsmedia.com
superpawbulous.com
qsigoqav.xyz
anshtiwari314.online
flood-risk.net
voegbedrijf-offerte.com
onliinnforrmmosa.com
duangendget.store
georgiausssa.xyz
boldmusicmgt.com
teamhore724.buzz
Targets
-
-
Target
MalwareBazaar.4
-
Size
810KB
-
MD5
60bd782aa615ee9354c2221b4ad7b80c
-
SHA1
f753f3c3c359b38c1051064417d6d0daf89db2c9
-
SHA256
62ca1c39badbfbc52c6301cb69c8356977db57656c6d98dac7e4ab908753af00
-
SHA512
0ddc9c16ac39aa6c006bd8ccd11194267b73d646b304f84b911153832dc7a6c960d60ebfc08d0d6314630e124e575bee4c81c75ffa7915faddaeae5d37b351e3
-
SSDEEP
12288:1y9WilQDz/bhj+nm3m6SsWCG0tP+KpIMD5w2T7S+w74fNJ658N:1wQDfhj+um6SgDEWHPdL65
-
Formbook payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1