General
-
Target
7093704bdad688cbdb775de4b07daf5e586a9a7c065537d870e4aa07c4fa2075
-
Size
455KB
-
Sample
240830-2g5hjszhmq
-
MD5
2ae8f998fd08ccc071d3161ba532281b
-
SHA1
1462a45cedfdf0653970a0d435427d7da072262f
-
SHA256
7093704bdad688cbdb775de4b07daf5e586a9a7c065537d870e4aa07c4fa2075
-
SHA512
c19792d812055d75318c3b92f6f1a2ed640820c9ea76f0064e28d684d566b5133c51b9bddcec2a87ffc637dcea3659a0b4b2af60bbb64aab01216a08e60eca2c
-
SSDEEP
12288:0nwfhbKQ1qLsVzlHs4FNNwjM3L7ZcD2WZdj:dhuQ0LPXjM3L7Zcjx
Static task
static1
Behavioral task
behavioral1
Sample
2d660b816d3e2c96db56d5d2e6743b8e649c63dda5e46327b5dbffdceab1d499.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
hs3h
slairt.com
teresasellsflorida.com
resouthcarolina.com
npccfbf.com
hutshed.com
westatesmarking.com
rustmonkeys.com
kagawa-rentacar.com
easyvoip-system.com
admorinsulation.com
ericaleighjensen.com
zhonghaojiaju.net
apple-iphone.xyz
b0t.info
torgetmc.xyz
lawrencemargarse.com
6123655.com
macdonalds-delivery.com
cvpfl.com
ayudaparaturent.com
toptenanimals.com
zambiadawn.com
muzoe.com
xtrembabes.com
nomadicfoodpods.com
sibernewskaltara.com
thelyfetour.com
sailinn.xyz
cisiworld.com
right-effort.com
emmanuelleramaroson.com
aptgdaycare.com
yanceyhomes.com
minooshargh.com
littlemontars.com
liuhemustam.com
tajaraenterprises.com
myteepathfinder.com
nectarselector.com
digitalbusinesscard.website
kirakira-woman.xyz
tntexpressdelivery.com
collectcuriously.com
marielagarciarealty.com
javierramonmartinezalarcon.com
eis-investment.com
bookanyclick.com
primespotshop.com
heatdistrict.xyz
beadedjoy.com
oyster-gal.com
umateam.com
reservadaspalmeiras-mg.com
thiramirez.info
stanfec.xyz
cowcoupon.com
humaneeventmedia.com
exquisitepdc.com
silverartandcraft.com
plomeroelectricistaquintana.com
encounterniagara.com
ram-nilu.com
standwithcode.com
sphereexit.com
alefisrael.com
Targets
-
-
Target
2d660b816d3e2c96db56d5d2e6743b8e649c63dda5e46327b5dbffdceab1d499
-
Size
724KB
-
MD5
139f804af6727f40136efc05b3810f07
-
SHA1
4e91c652e3fc8efaf060f39d2a31ae09b1b57090
-
SHA256
2d660b816d3e2c96db56d5d2e6743b8e649c63dda5e46327b5dbffdceab1d499
-
SHA512
cc037549c0e1dcde4ed7109709e9450a9370538fb1be3fdef03557e758209520c35b3ddefe61b7fdd8a1358a848ec9797ef8326f656c97ff880cdec37428f04f
-
SSDEEP
6144:Jo3K9Dnnyx65H+MfjJN5M/lqLuyRkXBymUQOuRH6vDdpQ2T7BxzaJK+Go6Uq2A:JocqGJaJ7BzUQOuR0RpQKExGZUi
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-