General
-
Target
1189ebcdb1a7a3b4ad58df14a4db5955672c5533f873298ddb212443a924c62a
-
Size
532KB
-
Sample
240921-fy2mbswgna
-
MD5
818d4382c38591724430e44cfcff3753
-
SHA1
7dc4183b8fa198017f9edd4e63494a65f3e7db8f
-
SHA256
1189ebcdb1a7a3b4ad58df14a4db5955672c5533f873298ddb212443a924c62a
-
SHA512
7be3dc7b78d4b225d3f7242d9fed158d2f982eea8d96ecef10dde1314aa33c93433324874f4024b6929d941b56243db06887de45ae8f901da2e304c8d315982b
-
SSDEEP
12288:ovkg445TMT6qhDkcY0eDr0oxT77/Knj3zFbSKl5JJdKPDbXlxoj7:ocyI2QoD0ePRJ77/KljXd+PQ7
Static task
static1
Behavioral task
behavioral1
Sample
gHALCP5u6qYbIzp.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
c18x
naer.top
loominc.club
eslgnpro.shop
rthodontist-53086.bond
hkil-art.online
-health.events
ustommygifts.online
reenscapemedia.online
mcometrade.online
mq8z.christmas
hristophersremodeling.biz
iverpoolvr.info
xlaw.app
heartpa.shop
nbxsbsk.shop
ompany-chargeback.pro
hevikingshucker.net
anaara.net
eadgenrndtbl.net
odagc.info
ind-lost-iphone.live
rainbroth.xyz
69bet.xyz
lliq.shop
hosphosphate.click
eeyee.net
harioteers.net
edup.forum
959725akwnhwi342.top
inematography-course-97660.bond
uick-loan-hk-2024-728.fun
usiness-printer-28580.bond
lientgroup.cfd
nline-dating-42548.bond
gallalaaquifer.info
roupemediaj.net
xgci.shop
zczerygest.online
asino-pinup91.top
anolony.shop
vamg.xyz
heepcorpmc.online
7724.club
ental-implant-grantss.today
utyerwr7.top
0oxcj.vip
ciytrw.xyz
269vipq.top
yncbyte.online
ffice-city.pro
thenafxsignals.online
nbulky.sbs
eteile.info
earchgpt.wtf
32xp919di.autos
oswigshopes.shop
urnituredesigner.shop
ixelsculptdesigns.net
ate-tea.online
sjdwxx.shop
astkhat.info
81836.pink
sb-asistence.top
asadigitalmarketing.pro
ephime.net
Targets
-
-
Target
gHALCP5u6qYbIzp.exe
-
Size
571KB
-
MD5
d46ea4a5851ace640a9f1ac3c3304e83
-
SHA1
3797c494b69de4c08d57e18d75e744196662d932
-
SHA256
dac46f3d278ac47faeadf5160565437d7abcbdc42a39a40482a12728dc088226
-
SHA512
f2927da84a4abfffe27761ed19716e548d4ae89d8cf0377314ef665980ff5956959b3447082b7ac247eb967ee49f20827b1dc7bf5b282973136c14709ad44ab0
-
SSDEEP
12288:/Hue0mNiwsiOORw9/sRU/XeL4fc+0eDr0orT77/Knj5jFbSKlHpJ0zW6iFw02g:/OOiwsiOtcyP0ePRP77/K3jtoLiKJ
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-