General
-
Target
d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277.exe
-
Size
688KB
-
Sample
240821-cvndrawalh
-
MD5
44919bd4c653cbd956628a0a5c1adf22
-
SHA1
c09669285e613c1cada8b50b0e9704dfd93fa31d
-
SHA256
d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277
-
SHA512
ffdf8c78835070e82672c38f634f710f7505061f36267cd0f034a07b061e65f89a7f0ade93e5c89a6691ad2770f05f8f69f70c0196bec2efb29220b17657385e
-
SSDEEP
12288:TNqsCwgqaVouc0PlsfdG2FXwC++UuVFK2T2y9Xl4mOv7TPbiH34ihoIgyo:TTC/qaSucKMduaFK2SwVLc7TsBhoI
Static task
static1
Behavioral task
behavioral1
Sample
d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277.exe
Resource
win7-20240704-en
Malware Config
Extracted
formbook
4.1
bi05
ollow-the-bit.online
aopho.autos
14ra567dp.autos
48651301.top
ussian-dating-54714.bond
sychology-degree-80838.bond
lytracker.xyz
strology-forest.sbs
swjbcl3.top
ridgenexttechnologies.partners
lroy.sbs
kyscreen.vip
anhit.live
uckyheart.xyz
orddserials.online
hetune.shop
nherited-traits-ant.bond
stanaslot-1.xyz
sychologist-therapy-36914.bond
iandramonami.net
5125.photo
p-fmweb002c684.top
x-scissor-lifts-glob-512.today
7winvn.net
oudya.shop
enks.top
ashion247.shop
oadtekpaving.net
istinctcsolutions.net
sjin.info
ata-protection-30362.bond
pfrt-22-mb.click
ucknowgames.info
nnovadis.online
gent.business
ffordableimpoundedcars.online
ort.lol
kwow.top
s-usdt.top
vnaiinew.info
rm888.shop
hnbakery.shop
hisismylguana.xyz
panish-classes-87877.bond
olan-paaaa.buzz
lkiv.xyz
hp520.xyz
uocdiengiai.website
fx168.shop
erapiacontraeldolor.net
ortal-bfl.online
antoshy.online
ruises-treatment-93183.bond
ursociotheory.xyz
9243.net
ingerie-43588.bond
udistsex.top
refabricated-homes-72652.bond
mail-marketing-91020.bond
d7xey20.top
7-casino-zsl.buzz
isualquotations.xyz
dn8pvdr.forum
dormy.click
hyma.cyou
Targets
-
-
Target
d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277.exe
-
Size
688KB
-
MD5
44919bd4c653cbd956628a0a5c1adf22
-
SHA1
c09669285e613c1cada8b50b0e9704dfd93fa31d
-
SHA256
d100685c3e62fde73e33854186142c68d4fdab117a4c2eb11a1c73dc362a1277
-
SHA512
ffdf8c78835070e82672c38f634f710f7505061f36267cd0f034a07b061e65f89a7f0ade93e5c89a6691ad2770f05f8f69f70c0196bec2efb29220b17657385e
-
SSDEEP
12288:TNqsCwgqaVouc0PlsfdG2FXwC++UuVFK2T2y9Xl4mOv7TPbiH34ihoIgyo:TTC/qaSucKMduaFK2SwVLc7TsBhoI
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-