General
-
Target
a0106cd24a942e7defec9c5dd3d49cee35d8c073af5f922f24d2e4bbdf610b08
-
Size
593KB
-
Sample
240901-g1xxlatgqa
-
MD5
0c517106467f1f323bf259e0e1781a55
-
SHA1
9fc8aec5e495f969a55389819188f1a3f7b895ee
-
SHA256
a0106cd24a942e7defec9c5dd3d49cee35d8c073af5f922f24d2e4bbdf610b08
-
SHA512
41de82806bff9f9b8f856885fe3fb0fb43a0d0fe389ddb1345fb1422db2f861b5a7c00569ef86c963f86ca20b606ab8eddcbbe1aa0ad33c016d0a01a3ebc9b3d
-
SSDEEP
12288:F2ICSXLpR0e6ULhn2JXPZOPMZuyUwHMlzqnUa248P6BVC/cWODbH7qsl:ZCyNLp2t/muUar3BAYrj
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip copy.scr
Resource
win7-20240729-en
Malware Config
Extracted
formbook
4.1
m49z
ormswarm.xyz
awn-care-63587.bond
uymetanail5.online
mergencyloan007.xyz
545.top
eiliao596.pro
ackersandmoverschennai.net
ehdiahmadvandmusicbest.click
tlgxmb2024.cloud
ulfcoastharborhopper.pro
rohns-disease-early-signs.today
oldenhorizonsbgcl.click
weetindulgencepro.xyz
yexoiup.xyz
yself-solar.net
kfirsatimla.online
bropub3.online
ouljourney.online
usvf76f.shop
onnaberich.online
erminia.net
nline-advertising-91281.bond
pt-23.live
ayhentai.vip
ockyjapan.net
est-mortgage-loan-2507.today
uikfox.click
870077.vip
hzjjys88.vip
hayrain.shop
63638d.xyz
ines.cafe
oomed.shop
addy-cazino.online
ellybharat.net
razeonthego.net
ickbrady.dev
872277.vip
nwoebz.shop
udatoga.xyz
j10j.xyz
utogongcom.net
14oz957dd.autos
sgarasjeport.online
xrmxfh150.xyz
3win2.top
alrv9s8.christmas
0847.photo
aturally-canadian.beauty
artnelide.top
ropertiesforrentfr.bond
j11j.xyz
otaislifexd.xyz
zesuteta.shop
avaburrn.rest
azavivianonline.tech
ealthcare-software-96535.bond
atrixdon.online
group.tech
ertiberiaterra.net
pneesxw.christmas
assaporteapn.shop
hangwuyi.cfd
ounter-courses.world
ysticastrospain.online
Targets
-
-
Target
Payment Slip copy.scr
-
Size
618KB
-
MD5
9516fc51941956b460ca13cce642284f
-
SHA1
dd0844cffa29d997465067f127d850a9924768cf
-
SHA256
795a83d84b04c245a8b0ad9221ea20a4635ad6654f22d533f499a5523ee2fe71
-
SHA512
69e33849cf1631d2f998a7c3f168eea0de7065f5acd7c246f32e85e28cd2aa129918cb59f19b6227829bb4bc1d89c197547db683bfaa54af3dadd2106d4c94ec
-
SSDEEP
12288:2U+ovYgcf3FgNsOS86CKLlxO9D78qp/+lXvk1yxmnInyroBrFBGkJmAiyUkR:x+oBcf3mNsODp2lX8Ym58BrnGkIANT
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-