General
-
Target
SecuriteInfo.com.Trojan.PackedNET.3060.13386.332.exe
-
Size
770KB
-
Sample
240923-vwd6ksvalq
-
MD5
13026754941320e654b4d10b8c7c37d4
-
SHA1
0c355a2c24b09bd90e84bc58c842176d0b18569f
-
SHA256
58cdcd2f49080d4471ffd169eb6cfe86f9efae01e45423492d0e31a4db510d60
-
SHA512
77cc08168c0a860f56157a0926c7cee8bd18531a85869e38b1fb585e20b03e11c669a7d1a4cf002e7f06a46e8b47411c0393913e161cc05a4717db011b799279
-
SSDEEP
12288:D8TRLrixlaIH2u8c2BBkWp/zYJCzFgxF5hB61ZRwbPHOAL6avHoj8jQm4OwgSUW:DMRyxlaIl+yUFghh2RwbW89jJ4DgVW
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.3060.13386.332.exe
Resource
win7-20240729-en
Malware Config
Extracted
formbook
4.1
j62t
qualegacy.shop
ijngblv.top
hop-tiktok.top
nti-aging-66026.bond
ostashqiptare-al.info
faretireltd.info
dra.finance
arden-office-45382.bond
nair.today
dence.tokyo
omoantifragilis.net
eet-new-people-26331.bond
ocfamilyto.llc
roduct-tester-jobs-68513.bond
elestialaurelia.buzz
uzzbuilders.buzz
ryptofaucet.xyz
krfq.shop
jbhu.vip
uemw.top
uke-paaae.buzz
q6z7.xyz
athing-suits-48943.bond
leaning-products-36759.bond
hatcode.app
earner.group
xistwithinthecontext.xyz
vu91.online
entalimplantsusasale.today
leveneleven.international
alenttotravel.net
airlosstreatment11.shop
mirror.live
ps.directory
rooki.shop
llslotbet.online
earme.lol
3d5doizqy.lol
onstruction-services-86411.bond
vip-company-app.website
tprhy88-ang.lol
oeziad.net
oudeserv.shop
atecards.net
xperiscore.online
ocutoraprofesional.net
zdq-f4pm.net
eal-estate-in-dubai-f.pro
dadi.sbs
upportwantbunssod.pics
njurylawyer119822.online
yhbvc.xyz
oofing-services-19582.bond
dtools.net
lood-glucose-monitor-11002.bond
winvip13.fun
ome-care-37159.bond
usicalevents.xyz
262tdcmhx.bond
01527.xyz
rthodontist-2507-vcf-sup.click
igitalgroup.cfd
enddid.shop
liviamartinez.net
agacity.press
Targets
-
-
Target
SecuriteInfo.com.Trojan.PackedNET.3060.13386.332.exe
-
Size
770KB
-
MD5
13026754941320e654b4d10b8c7c37d4
-
SHA1
0c355a2c24b09bd90e84bc58c842176d0b18569f
-
SHA256
58cdcd2f49080d4471ffd169eb6cfe86f9efae01e45423492d0e31a4db510d60
-
SHA512
77cc08168c0a860f56157a0926c7cee8bd18531a85869e38b1fb585e20b03e11c669a7d1a4cf002e7f06a46e8b47411c0393913e161cc05a4717db011b799279
-
SSDEEP
12288:D8TRLrixlaIH2u8c2BBkWp/zYJCzFgxF5hB61ZRwbPHOAL6avHoj8jQm4OwgSUW:DMRyxlaIl+yUFghh2RwbW89jJ4DgVW
-
Formbook payload
-
Suspicious use of SetThreadContext
-