General
-
Target
eda2a3697b4e225f87d1b030dc3c44b0N.exe
-
Size
615KB
-
Sample
240804-pny8wsvfjr
-
MD5
eda2a3697b4e225f87d1b030dc3c44b0
-
SHA1
7e7ac637c5e7e02983a3e4f986c672cf5296f884
-
SHA256
20c39a927f20f265fcb976c59701038dd425fd58cdd1cbab997038027d7e9265
-
SHA512
167e292c6ed7f819d12a085f693de07f496848e26396ac97ba22b0d9db4d08758fdcac1eedfd390dfef9b5eec4c00f15a951a891e918745a13de55529d996cef
-
SSDEEP
12288:NJDeM2fEkbEJjgRLDXpZd8i2V26gwaYyH/FazXqhp1jMSDukR:baZEkbxnXDY2wa9NgXa1jF
Static task
static1
Behavioral task
behavioral1
Sample
eda2a3697b4e225f87d1b030dc3c44b0N.exe
Resource
win7-20240704-en
Malware Config
Extracted
formbook
4.1
oi12
exobello.bio
boinga.xyz
animasriversurf.com
gamesflashg.com
hayatbagievleri.online
washington-living.com
july7.store
x-pod-technologies.com
farmhouseflaire.com
qb52aa.top
datasynthing.xyz
5v28n.rest
legacycommerceltd.com
mundodelosjuguetes.com
wjblades.com
z9b6g8.com
eskimotech.net
dreziuy.xyz
bestsolarcompanies.services
vertemisconsulting.com
rockinrioviagogo.com
acimed.net
tdrfwb.shop
xd4tp.top
bihungoreng19.click
tcnhbv301y.top
triumphbusinessconsultancy.com
menuconfig.store
seikoubento.com
defiram.com
bespokearomatics.com
yellprint.com
flickeringlc.christmas
aidiagnostics.xyz
ok66g.app
z3o6i8.com
dacoylomarkemilcajes.online
rummymeett.xyz
arazivearsa.xyz
crystalpalaces.store
qtsandbox.com
wkbbb.com
abusedcode.com
puzzle-escape.info
jagoboss.com
seguro-pagamento.life
luxindicator.site
mxtp.coffee
okumafishing.xyz
gaffelshop.shop
optimusgs.com
qtsandbox.com
bt365332.com
kernphoto.art
p0uhx.pro
agsaydinlatma.online
korbidholdings.net
nsservicescorp.com
healthcare-trends-22748.bond
xtraslot.link
travelblitarjuandabmtrans.com
linlinda.com
gnonhcav.xyz
05544.xyz
selalujadipemenang.com
Targets
-
-
Target
eda2a3697b4e225f87d1b030dc3c44b0N.exe
-
Size
615KB
-
MD5
eda2a3697b4e225f87d1b030dc3c44b0
-
SHA1
7e7ac637c5e7e02983a3e4f986c672cf5296f884
-
SHA256
20c39a927f20f265fcb976c59701038dd425fd58cdd1cbab997038027d7e9265
-
SHA512
167e292c6ed7f819d12a085f693de07f496848e26396ac97ba22b0d9db4d08758fdcac1eedfd390dfef9b5eec4c00f15a951a891e918745a13de55529d996cef
-
SSDEEP
12288:NJDeM2fEkbEJjgRLDXpZd8i2V26gwaYyH/FazXqhp1jMSDukR:baZEkbxnXDY2wa9NgXa1jF
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-