General
-
Target
20092024_0758_20092024_purchase order.7Z
-
Size
527KB
-
Sample
240920-jt4snswdnb
-
MD5
e4620e2f0970771672bd6d53504cb8ee
-
SHA1
e18b0c66d9611d394a5fda78ee8b620a5b3c3626
-
SHA256
26d114f221d28e6e9df7dac1596388600785c9e3611e41ff9d304952e4eb5a9b
-
SHA512
c75f3334ebfa4a0ee4f366c516d1a5381ed86bc7b7b3062d16c752fcf2acad6fb355af8eca82d19f77f7d1910eff54cb4fdd85cad67883bbe958a418f2ab0a80
-
SSDEEP
12288:euQhwJ2HNYE4G43qzRcaiiU1sXOEZL923EUo4Ef2Fk:VQIEgwRcai7ILCEP4R+
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
t94g
32188.top
mergencyroofrepair656460.online
jkahu.fun
ur4.autos
r0lba4cl0qkaws8.bond
eiliaowang.top
urjav.xyz
kidaman15.click
old-removal-p350.today
levatethismedia.info
h33323s40.top
dormy.click
5406.club
earlofwisdombook.pro
6980.app
ellwood999.biz
otdates.lol
164v.shop
thereal.app
takeget.online
andshakecap.info
urevitality.fit
hinabrasilexpressbr.shop
agacuan6.cloud
ehuacs.vip
ostbr.online
xh354.xyz
texhio.online
utoflightbookings.online
uikfox.top
razeonthego.net
ardenartpros.xyz
rain-pipe-cleaning-72352.bond
argoindah.online
ilo808.vip
urartexplore.top
likbet77ofc.net
olacecarenetwork.info
nfluencer-marketing-47216.bond
alerico.net
ywildchicken.net
8nj2.shop
alsam.bond
emaxvalley.xyz
uwevei8.pro
lwp6c7v.xyz
hongzhuankk02.yachts
kokbihi.online
kxt.xyz
ctivgym.online
he616comies.shop
loto.app
lpha-mn.dev
ungle-product.shop
duaus.fun
roduct-tester-jobs-48097.bond
ikkidigitalpro.net
oppr.fit
uxk-porn-slut.top
aoudimall.net
pessin.tech
ackhoffman.art
echonocat.fun
t-courses-mw-2.bond
uggernauty.net
Targets
-
-
Target
purchase order.exe
-
Size
547KB
-
MD5
5296af4ed8e6f9d06274547012b5ba62
-
SHA1
2da877c31b6213e05fe65219bcf8a422cbb5b68b
-
SHA256
fc5677c59829c91effde4a5b050dd517d089cee3a6bf9eb752695f3402e2dc28
-
SHA512
77d9d10b1cda513fcdb04bac41ff7511a301c450b6f2f23a2bd86b1f709a58545ec53baa961579b483999d1579c5d47942e889f2a66fe84e327c25947f9078e6
-
SSDEEP
12288:f0wru3+OWz4QX9i1uNU1ubuMFZ0K6SYwg+5dVZ54ohPuyrHQj:swyU9iQNhbue6PHOdVZ54oa
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-