General
-
Target
204b37ff2e52aaf44a3442c41632c3dec2af83c568e0189c1240ec3572b8c086.img
-
Size
2.0MB
-
Sample
240926-bl6nas1gjc
-
MD5
77aa9fa2b7f3b3c9231a65935804d6d1
-
SHA1
f2459001880103203525adc1c0415a1614f916ab
-
SHA256
204b37ff2e52aaf44a3442c41632c3dec2af83c568e0189c1240ec3572b8c086
-
SHA512
a80da67805f26c42f180c577f8db4195ed13f28ef1a2bdd68743a3b52ddc81c2fc7f6657cc927a84cde400c595a4c960d20c8bee7400db0d59412a05fa684232
-
SSDEEP
24576:6JPXX+a20rK/dxUpe8PQBANjA3vDxLM50BgKqd7hpnM:
Static task
static1
Behavioral task
behavioral1
Sample
Gimegq.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
e62s
ellinksa.shop
uckyspinph.xyz
owdark.net
arriage-therapy-72241.bond
w7ijko4rv4p97b.top
heirbuzzwords.buzz
aspart.shop
ctivemail5-kagoya-com.info
shacertification9.shop
zitcd65k3.buzz
llkosoi.info
ru8.info
rhgtrdjdjykyetrdjftd.buzz
yschoollist.kiwi
oftfolio.online
rograma-de-almacen-2.online
oudoarms.top
mwquas.xyz
orjagaucha.website
nlinechat-mh.online
nlinebankingrates.net
3llyb.vip
42du394dr.autos
ahealthcaretrends2.bond
gbox.net
anatanwater.net
amearcade.shop
ighrane.online
01599.xyz
ams.zone
-mart.vip
42bet.xyz
6snf.shop
nitycacao.shop
arageflooringepoxynearme1.today
c7qkaihvsc.top
amingacor.click
airosstudio.tech
iktokonline.pro
homasotooleboxing.net
ashforhouse24.online
1539.app
atangtoto4.click
ndex.autos
atorengineered.tech
angkalantogel.company
ajudepo777.top
jacksontimepiece.net
gstudio-ai.homes
unter-saaaa.buzz
atageneral.sbs
ingston-saaab.buzz
i5t3.christmas
ampanyaak.click
dneshima.today
angbaojia.top
ubuz.net
pp-games-delearglu.xyz
insgw.bond
7f243xb.skin
roliig.top
wdie3162.vip
reechagroup.vip
op-phone-deal.today
orsaperevod.online
Targets
-
-
Target
Gimegq.exe
-
Size
2.0MB
-
MD5
42a6e331406ad55f27ad1e3ad7ba13e6
-
SHA1
75b2c9970e0a356af251dad5f4e64c538bbb0ce3
-
SHA256
845cadd4d3a49f38dbd20a685cbd8c0405ca1af4e69aa252082df841a10d16ab
-
SHA512
2cbbcdbeb156ccfd4b1edabbdf74286418e80bd683b2c002bb8adf7ec02eca78b0da437c413950dd4bda906e4418e310d03db1c2bc74e639702c65b6798ed308
-
SSDEEP
24576:AJPXX+a20rK/dxUpe8PQBANjA3vDxLM50BgKqd7hpnM:
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Formbook payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-