General
-
Target
4efa0c0ddb802a05161342bb22941fb5e45fdb423a0455995b9642d238a0dcb3
-
Size
537KB
-
Sample
240912-qblbyawdpk
-
MD5
1fc3514ff34a401d23b6d2276d55bd54
-
SHA1
6173117802b17f28734057ae931ae865c7faf43e
-
SHA256
4efa0c0ddb802a05161342bb22941fb5e45fdb423a0455995b9642d238a0dcb3
-
SHA512
7ca8e5a460686d403f76b7c092b6a7657404dfa65e45ea98fee4bbc9660f7c249e7db0d4a5d59da8f2fb3d82d3db397fb509886b45d78fcf8917efcae1374afc
-
SSDEEP
12288:6OcnVHeZr6sMFTVJQzsUhjuI3RuYr/V4ZhHHfvrRj6EcfaKJox6o:aHeZrnKVqsMRuYrqJ91cfaAs6o
Static task
static1
Behavioral task
behavioral1
Sample
Cf2vVo7XyxupqsL.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
sx01
r-salessolutions.xyz
jdh1.info
olar-panel-jobs-93084.bond
aebrasil.shop
oshua-xaaaa.buzz
xzkm.shop
nitedviplumbing.net
nnevateknoloji.xyz
rg-a.biz
indow-replacement-34091.bond
uyersagent3percent.net
ostbag.net
ibosolv.net
ahve.today
ophotshotjobs.today
emoreez.art
ift-chairs-94905.bond
okerdom-e.best
stagr.fun
irtyf-ingrancher.info
isviral.xyz
000rtp10.lat
tonomushotel.tech
26kd.shop
tarrypath.click
athroomremodeling-au.bond
ruthu.art
reatindiagame.net
oyroom.top
imusol.xyz
acuum-cleaner-36278.bond
psantennas.center
d1ot18.top
ybird.click
reenwitchery.shop
verythingtoys.net
j6t.xyz
surionatt.info
ronzon.tech
0240725pay.vip
ressfitting.info
itchen-deals-68231.bond
unvcxt.shop
hances.pro
ar-deals-15908.bond
xana.shop
onfirme-5.online
augdfgi.pro
romocionesguajaraz.info
etry.tech
bckorea.net
zcase.online
kksoyuz.online
sychology-degree-49198.bond
resdai.xyz
-bot-pasha01.buzz
aleemtips.online
allnyy8.shop
elso.app
onacat.online
gowelcomeflingofswish.homes
agamentospolo.online
24bm205er.autos
ulinary-schools-68403.bond
aggiemonroe.net
Targets
-
-
Target
Cf2vVo7XyxupqsL.exe
-
Size
587KB
-
MD5
0e4215aade422aeb64ff45d5712adc7e
-
SHA1
66303d555188ba6124021b09b3291b1326090ccf
-
SHA256
030d40369b21914a62ecd144abafc689073ac077c5481e4722154e2a565bc328
-
SHA512
89dfec073a28109fb96da6a0d1a82d520047d3f06a852757b9bb35f15283c7d746060f500969a9474a0fe0d4af8cd2515eedd8167950ef69cd0ee704a8509fd5
-
SSDEEP
12288:X3OSUWtbmf6juFEqopZXMg3xhEejaI3huYrDV+Zh1u8Djx8kWK2XH:uS3O6jVzMwE0huYr4+8DibK2
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-