General
-
Target
Wire Transfer Copy-006566.lzh
-
Size
583KB
-
Sample
240829-kr78rasflh
-
MD5
578c8a0ffec06b2a50efd37cabc57e59
-
SHA1
7c2329d816c3c3639a3cb61b0e83d4f1c09bd602
-
SHA256
89c2137b3dec9c0698bb3980b98eda725224bc28c54fa8159d71f580be48800a
-
SHA512
82f8c6bef24288a0bab8ff72b9b8396c20c0b882c58da18bb80c23e4e78112d7ac007b79bdd5770d139f327901ffce056297d372d694244c2ddd37dc9cd90f09
-
SSDEEP
12288:ZJLjDNKTbpOV5INKjnac2hIgvlKTMiKG5fA1I1xOkn6P5EnBdqH:ZFjDNypOQMbac2UjPjOQFBda
Static task
static1
Behavioral task
behavioral1
Sample
Wire Transfer Copy-006566.exe
Resource
win7-20240704-en
Malware Config
Extracted
formbook
4.1
m49z
ormswarm.xyz
awn-care-63587.bond
uymetanail5.online
mergencyloan007.xyz
545.top
eiliao596.pro
ackersandmoverschennai.net
ehdiahmadvandmusicbest.click
tlgxmb2024.cloud
ulfcoastharborhopper.pro
rohns-disease-early-signs.today
oldenhorizonsbgcl.click
weetindulgencepro.xyz
yexoiup.xyz
yself-solar.net
kfirsatimla.online
bropub3.online
ouljourney.online
usvf76f.shop
onnaberich.online
erminia.net
nline-advertising-91281.bond
pt-23.live
ayhentai.vip
ockyjapan.net
est-mortgage-loan-2507.today
uikfox.click
870077.vip
hzjjys88.vip
hayrain.shop
63638d.xyz
ines.cafe
oomed.shop
addy-cazino.online
ellybharat.net
razeonthego.net
ickbrady.dev
872277.vip
nwoebz.shop
udatoga.xyz
j10j.xyz
utogongcom.net
14oz957dd.autos
sgarasjeport.online
xrmxfh150.xyz
3win2.top
alrv9s8.christmas
0847.photo
aturally-canadian.beauty
artnelide.top
ropertiesforrentfr.bond
j11j.xyz
otaislifexd.xyz
zesuteta.shop
avaburrn.rest
azavivianonline.tech
ealthcare-software-96535.bond
atrixdon.online
group.tech
ertiberiaterra.net
pneesxw.christmas
assaporteapn.shop
hangwuyi.cfd
ounter-courses.world
ysticastrospain.online
Targets
-
-
Target
Wire Transfer Copy-006566.bat
-
Size
620KB
-
MD5
196e5396decbd8a8c4fbad95879b8a80
-
SHA1
e38084937ff988d95cb1d0ecc94d1c3bff6c419a
-
SHA256
ccbabb104efcbd684a891982f957df4f45ea42323f3e2c26c3ffd6816f0832bd
-
SHA512
9411c95a1500ecb01b10f4ee7cb3f0135f376d8f7f2c70e69506d1685fd16aea1468d56465ae60cf6593c8717bab68229cb7d4341535abd7a3c0db9b4e84dc1c
-
SSDEEP
12288:nVVRCY4DZ8fazulqCgPAq1FE31PfzHXefLT3kR:7RCY4d80Iq1A1HzH0y
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-