General
-
Target
ASA S27.exe
-
Size
692KB
-
Sample
240913-lx9t7sxanl
-
MD5
c3c19eded0a05cdc8b8740d97ebfdccf
-
SHA1
506138ac626ce46c5ada87bf83d703270fe329d9
-
SHA256
1625bc28c0c1fd3e4375430f222944d92c2b31b2543b5c8703dc5463cd68d1e3
-
SHA512
d075626bbad97c960dc892164dee8110d5897203dfeeeed1314e0c3d0aa2e71b0a4cc18bad6d493054a2263a1d83c2e4c4f154d7556f0ff162185d6fccd96aa4
-
SSDEEP
12288:xYV2o24S0WnqLtlbylU47swoC7Xl9wfWOVoiAaUnnLODW15R:22HL0xLqoNC7sjpPULSgR
Static task
static1
Behavioral task
behavioral1
Sample
ASA S27.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
h209
sbtstuff.site
omlyes.com
movershifting.com
gearballer.com
oketoto.pro
myringleader.com
lrcjc750s.xyz
ata2024.xyz
password-manager-89409.bond
aiassistanthub.net
changvolt.cfd
netino.site
wear-wale.com
omnipresenceagency.com
huangguan.ooo
propersonnelmedia.com
9332952.com
k3s.support
ciytrw.xyz
cb095.pro
royalreshortbooking.xyz
studio29photography.com
62472.xyz
offerseshop.com
xn--mjru74buk5boca.store
jzzkjvaz.com
qzbt7s.com
atsinvest.com
goldengoosemultiplier.com
investing-courses-66663.bond
blueflamenews.com
xn--72cb0bab2pc6b3j3b.com
damtv24.xyz
ya1w.top
margueritemeilleure.com
zinittech.com
testingdomain.xyz
zakenlatyn.xyz
jungdofire.com
jackpfenninger.com
comfyquiltsbysusan.com
weststarconstructions.com
accrevcenglobal.com
ok9km1.fun
cxbqchm.life
review-with-hossain.com
webmedianews.com
visioncaretutor.com
r9x4g.xyz
nicorinehart.com
airhead.icu
genesisproj.online
hebatduta77.com
xiaopangonsol.com
cilynder.com
nestnerd.xyz
95476.photos
wearepartisan.rocks
snowshop4.com
podoc.fun
psicologaceciliabarros.com
klassens.info
therocketlobsters.com
world-palace.com
antibirdnetservices.com
Targets
-
-
Target
ASA S27.exe
-
Size
692KB
-
MD5
c3c19eded0a05cdc8b8740d97ebfdccf
-
SHA1
506138ac626ce46c5ada87bf83d703270fe329d9
-
SHA256
1625bc28c0c1fd3e4375430f222944d92c2b31b2543b5c8703dc5463cd68d1e3
-
SHA512
d075626bbad97c960dc892164dee8110d5897203dfeeeed1314e0c3d0aa2e71b0a4cc18bad6d493054a2263a1d83c2e4c4f154d7556f0ff162185d6fccd96aa4
-
SSDEEP
12288:xYV2o24S0WnqLtlbylU47swoC7Xl9wfWOVoiAaUnnLODW15R:22HL0xLqoNC7sjpPULSgR
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-