General
-
Target
2d29191fb5dd27ba947a5c7adfaaa5cc643bf7475e37c1d7825f4b7bf02e93ed.xz
-
Size
565KB
-
Sample
240829-rgmmmawalg
-
MD5
702bbffff7126075cb2b932271449491
-
SHA1
0e787dfcdb11cb2b771413284f62092b95a906ac
-
SHA256
2d29191fb5dd27ba947a5c7adfaaa5cc643bf7475e37c1d7825f4b7bf02e93ed
-
SHA512
abbc6067f8a4118d45ea0fbc05f8cd8a657a50756e7d1a7e39430d34552a170098df76a8e44563aeef1eadcb4f35f1b6a9a942084461c6d08412622a45e99b22
-
SSDEEP
12288:9X1vvdOqExpiOJ1SdGYHOZxiyQtRLOAsRloo+Ko7AZ7E:zoxpiOqdGt+1avRKnKuGA
Static task
static1
Behavioral task
behavioral1
Sample
2d29191fb5dd27ba947a5c7adfaaa5cc643bf7475e37c1d7825f4b7bf02e93ed.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
kmge
jia0752d.com
cq0jt.sbs
whimsicalweddingrentals.com
meetsex-here.life
hhe-crv220.com
bedbillionaire.com
soycmo.com
mrawkward.xyz
11ramshornroad.com
motoyonaturals.com
thischicloves.com
gacorbet.pro
ihsanid.com
pancaketurner.com
santanarstore.com
cr3dtv.com
negotools.com
landfillequip.com
sejasuapropriachefe.com
diamant-verkopen.store
builtonmybrother.art
teoti.beauty
kickssoccercamp.com
chickfrau.com
compare-energy.com
icvp5o.xyz
susan-writes.com
dropletcoin.com
sivertool.com
sup-25987659.com
weedz-seeds.today
agritamaperkasaindonesia.com
safwankhalil.com
jm2s8a3mz.com
wfjwjm.com
be-heatpumps.life
hcwoodpanel.com
n5l780.com
mandalah.art
szexvideokingyen.sbs
justinroemmick.com
thecoolkidsdontfitin.com
gsolartech.com
swisswearables.com
chicagocarpetcleaneril.com
terrazahills-cbre.com
santatainha.com
sacksmantenimiento.store
wzhem.rest
shearwaterpembrokeshire.com
baansantiburi.com
mid-size-suv-87652.com
solunchina.com
nandos.moe
blucretebistro.com
identificatiekvk.digital
8772876.com
longfangyun.com
litblacklit.com
mobilferrari.com
zeeedajewelermusic.com
allenbach.swiss
industrialrevolution.ink
cmgamingtrack.com
a2zglobalimports.com
Targets
-
-
Target
2d29191fb5dd27ba947a5c7adfaaa5cc643bf7475e37c1d7825f4b7bf02e93ed
-
Size
1.4MB
-
MD5
bccb4486f1e982d371742a1b178f096b
-
SHA1
5cb21784a1174c30f723b3f6bbf3f775292118aa
-
SHA256
8e494fa1ea9ae24f5261f0c38c8aaae8fa2566ca08f95287f3c326eaa98c0e09
-
SHA512
29d53241a30a9fb347efbd114f7890925d840f46df10ed801d016436a11e34ad4abd3514a8442501ff7812606256cd35a5e231e2292cb6029a6f0fbf27a9c191
-
SSDEEP
12288:Xm5tWd+qExpizJ10dJYHOZ8iyQvR7OAsRluo+KMF7z:M/xpizsdJtbPKvRUnKE7z
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1