General
-
Target
f691fb2c2b5183a496711a5b78b575ce.hta
-
Size
115KB
-
Sample
240923-wvbjqszcqa
-
MD5
f691fb2c2b5183a496711a5b78b575ce
-
SHA1
ce9603dd85d843e4fd9fa66843f46ca5ece4e260
-
SHA256
1c7d8ace58257e970e2f7738886c596d8189f85cef9127dba9b324735f506821
-
SHA512
ce1e7a6b64b0d14d1d42ddf134d5db74aa8a17c6945c32f17829fbce7f309bd8f34ac1d750548c66c1cf4dcbd234531c6f57e354ac5f605331d39a57d9bb11ba
-
SSDEEP
96:Ea+M7iHLlFPiJSHLqFPiJGkpmfORxcHLoHLDFPiJTHLQcAT:Ea+QiHJFPlHOFPhLHsHfFPmHcT
Static task
static1
Behavioral task
behavioral1
Sample
f691fb2c2b5183a496711a5b78b575ce.hta
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
j62t
qualegacy.shop
ijngblv.top
hop-tiktok.top
nti-aging-66026.bond
ostashqiptare-al.info
faretireltd.info
dra.finance
arden-office-45382.bond
nair.today
dence.tokyo
omoantifragilis.net
eet-new-people-26331.bond
ocfamilyto.llc
roduct-tester-jobs-68513.bond
elestialaurelia.buzz
uzzbuilders.buzz
ryptofaucet.xyz
krfq.shop
jbhu.vip
uemw.top
uke-paaae.buzz
q6z7.xyz
athing-suits-48943.bond
leaning-products-36759.bond
hatcode.app
earner.group
xistwithinthecontext.xyz
vu91.online
entalimplantsusasale.today
leveneleven.international
alenttotravel.net
airlosstreatment11.shop
mirror.live
ps.directory
rooki.shop
llslotbet.online
earme.lol
3d5doizqy.lol
onstruction-services-86411.bond
vip-company-app.website
tprhy88-ang.lol
oeziad.net
oudeserv.shop
atecards.net
xperiscore.online
ocutoraprofesional.net
zdq-f4pm.net
eal-estate-in-dubai-f.pro
dadi.sbs
upportwantbunssod.pics
njurylawyer119822.online
yhbvc.xyz
oofing-services-19582.bond
dtools.net
lood-glucose-monitor-11002.bond
winvip13.fun
ome-care-37159.bond
usicalevents.xyz
262tdcmhx.bond
01527.xyz
rthodontist-2507-vcf-sup.click
igitalgroup.cfd
enddid.shop
liviamartinez.net
agacity.press
Targets
-
-
Target
f691fb2c2b5183a496711a5b78b575ce.hta
-
Size
115KB
-
MD5
f691fb2c2b5183a496711a5b78b575ce
-
SHA1
ce9603dd85d843e4fd9fa66843f46ca5ece4e260
-
SHA256
1c7d8ace58257e970e2f7738886c596d8189f85cef9127dba9b324735f506821
-
SHA512
ce1e7a6b64b0d14d1d42ddf134d5db74aa8a17c6945c32f17829fbce7f309bd8f34ac1d750548c66c1cf4dcbd234531c6f57e354ac5f605331d39a57d9bb11ba
-
SSDEEP
96:Ea+M7iHLlFPiJSHLqFPiJGkpmfORxcHLoHLDFPiJTHLQcAT:Ea+QiHJFPlHOFPhLHsHfFPmHcT
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-