General
-
Target
16092024091216092024RFQREFJTCAJCQINHP5TISL0009ALDHAFRAALJABERSUPPLY.zip
-
Size
934KB
-
Sample
240916-ma3ytasclj
-
MD5
3f8bdebacbb560b2a43895b9f2450f47
-
SHA1
3677b368af393ba2a2deaf49dc6182bde0c4e769
-
SHA256
7c3d71786ef85ec70f27b53e7bdd98f202398a77d52399d49135cf5e187a3dab
-
SHA512
b3c06a9d290cb593dfbec09cb2dabb38f444177bdd1ffb146bb948327a5cb116e4e1a62b705ee8a7f699d1ad7976a3d3e19edf482c991a9c010898514147d357
-
SSDEEP
24576:39ku+84jWVcYVvoqY2kiUlWHyM/bfUfOccxNlIcthLO6Tf+K74:39kuhq69VBY2ssLQfMycLOy2K74
Behavioral task
behavioral1
Sample
RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
bs26
bhkflatforsale.today
89486.cyou
asstortlawsuit-26.today
935fkg.top
lanetaryadventure.website
5-77.xyz
yankosensei.top
esasi.boats
ortasmundial.online
gfo.net
mhgriu.xyz
440.top
52zh366hq.bond
arage-door-tab.fun
heriffburns.info
ndogamingslot.club
lrinstlusa.today
ssdefdhet.fun
dbg.net
ome-remodeling-82737.bond
sychology-degree-49198.bond
eon-zerkalo-obd1.buzz
46sj488ux.bond
138hoki.yachts
ircuit-board-assembler-us.bond
raphic-design-degree-98455.bond
erherseershjrre.buzz
ekabit.online
impemos.cyou
otgoingback24.net
ust.digital
lsheikh.click
mail-marketing-57276.bond
hampion-casino-fhy.buzz
irtyf-ingrancher.info
ustomaglow.xyz
efloristika.online
djinni.buzz
egaplex.dev
oundroutdoors.club
aco.lol
reme.delivery
oursocialclub.xyz
ffertop.online
dinfotech.info
ydzndy.biz
og-walker-jobs-62009.bond
verybodyeats.services
earchgpt.homes
njoei.click
yler-paaac.buzz
mni-streak.net
aaldemo.click
rectionpower.online
sian.lol
belivedi.cfd
d516249.online
nfluencer-marketing-89430.bond
ransportationmqmptpro.top
ymortgagebusinesssucks.shop
931.bet
ruise-jobs-39837.bond
nglessemneura.shop
sed-cars-81272.bond
34679.sbs
Targets
-
-
Target
RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe
-
Size
959KB
-
MD5
a4be50bb39110e49c1d2fc87ccc12f56
-
SHA1
ffc4874f95b0c774ad54988350128eadfaeebc23
-
SHA256
b967a8b7765a762514d4b8d172fabb655af83d7279fd15cd513e217675ce96a9
-
SHA512
241476b5ab26dc7a8673daca8cb6b76b46b9e87092e09e7db643368b8514d439e1bf502a42b9f6b082ce2fc92c3ca2141bd34e8068bc77820c06d4892242f575
-
SSDEEP
24576:hiUmSB/o5d1ubcvLiUlytyo/bfUbycmjNlscnVDO8TR+KDV:h/mU/ohubcvhMXQb6kcROgIKD
-
Formbook payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-