General
-
Target
10092024_1712_10092024_Comandă de achiziție nouă pdf.zip
-
Size
1.0MB
-
Sample
240910-vq696swemf
-
MD5
fe66c20d3df78b440aad967c14468b95
-
SHA1
70dd7bc8fd103b19352b8534a6b12e4df8d09854
-
SHA256
7d006ea5798555187db42336b482f56f3ee6d4c2a8e93df6d64037de79ba6f49
-
SHA512
f477450e86fd1b15033f6a3a06b41fa3853950ff19aca1d9bab5c267f584ecffb2d0b14d02dc6ca6899591568e16edc08bf359e4b446d863256ef3de5a5ef557
-
SSDEEP
24576:AH5oqpXcqR+DNEXU2fDpZcyEqWH4rrTG1k0DGkIdpPtDtIuBoAp9vBbUJW:Ao4ECXU2fdp5rr6130dviArBUU
Static task
static1
Behavioral task
behavioral1
Sample
Comandă de achiziție nouă pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Comandă de achiziție nouă pdf.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
formbook
4.1
gy15
hairsdeals.today
acob-saaad.buzz
9955.club
gild6222.vip
nline-shopping-56055.bond
lmadulles.top
utemodels.info
ighdd4675.online
nqqkk146.xyz
avasales.online
ortas-de-madeira.today
haad.xyz
races-dental-splints-15439.bond
hilohcreekpemf.online
rrivalgetaways.info
orktoday-2507-02-sap.click
eceriyayinlari.xyz
lsurfer.click
aston-saaae.buzz
etrot.pro
68mp269rf.autos
ndia567.vip
jinni.buzz
rey.app
enior-living-72184.bond
rogramdokpirdarmowy.today
ejcloud.info
ools-59989.bond
astbiz.net
ixaahx.shop
hqaiop.xyz
indow-replacement-46487.bond
rogramdokpirdarmowy.today
remoter.net
ecorationworld.net
ilkool.info
bandoned-houses-50880.bond
andscaping-services-2507.today
42ve.shop
orthfitness.net
ink-gluwty.online
18721.club
ahrump.homes
uuxe6hi1l.lol
hopbestdeals.online
rocbotserver2.online
8210.app
oftware-download-44761.bond
78ex.net
lake-paaab.buzz
olocal.app
oxpal.best
hetinkerfoundation.net
eleerm-czjp.top
omaininformaniacion.fun
ahadevindia.info
j11.online
isax.xyz
lennjones.shop
48691640.top
6747.asia
stralvoyage.website
aihora.info
0372.photo
asposted.online
Targets
-
-
Target
Comandă de achiziție nouă pdf.exe
-
Size
2.0MB
-
MD5
e5a337b7c7fc380562683f2f7f72e0f2
-
SHA1
49e8d006f134165696f4bd5fdcb1e64aa51f0f47
-
SHA256
32c368fd65657924f718e0d68afe18f36fa1df2b3203bc71a6cd00073ecddc94
-
SHA512
a6b3866ac3be8c304804916ff4dac0acc8e1d6b0a09762e1e4c85999b46f07dbe8d25ca894c9b34ea30067163fea6c76a165d479facedc1dffb5b1acb842beae
-
SSDEEP
49152:2fDe+fmH7RRZ1UW84VCyH+4FAGqnx+lg3jszc8u1xESCgIAPpUm:2fDQQs0YbM
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Adds policy Run key to start application
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1