General
-
Target
a3a0f6ef77d8d2270b5baac5ac9185bdf9e30351e61cb6f7a90c76601e004b15.exe
-
Size
600KB
-
Sample
240926-cmk9es1ekq
-
MD5
a666dc5c6765f6912878fc840aceaf82
-
SHA1
9f804c5d474f723f6c08cac07569c237c25286a7
-
SHA256
a3a0f6ef77d8d2270b5baac5ac9185bdf9e30351e61cb6f7a90c76601e004b15
-
SHA512
4835ff70937f9b5f0da3e2ff61126255b1da74e7c0be00654e062b9b5463ad10380b1e2952c7ccaf05d9090a03c8a020ec6baf6cd7b3259ab54e3de57582553b
-
SSDEEP
12288:hhr8bQb07Lo2kJc9SkHKksvXYXaGtfTiGEXV9JT6newNcGn:gIEcWSkMvoKGtfTiGAWqW
Static task
static1
Behavioral task
behavioral1
Sample
a3a0f6ef77d8d2270b5baac5ac9185bdf9e30351e61cb6f7a90c76601e004b15.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
bopi
zq4.top
relationship-coach-88497.bond
destekbirimi.xyz
tgh-reg.xyz
pepcapital.net
edunote.media
loans-credits-63765.bond
zhxgtlw.top
rajalele.xyz
ug-tower.asia
agrajter.com
investment-services-44387.bond
yaoxiaocang.fun
23win6.top
used-cars-84168.bond
primesourceglobal.net
indiapostsk.vip
qe2i7cghzpebk.buzz
furniture-27975.bond
fy489tysiot4twoinsr3295y78h.xyz
lioncatonsolana.xyz
kamistpromotions.biz
casino-x-gcl.buzz
toplivingtips24.info
amblinds.shop
techtalks.live
freshmell.shop
anfog5mmjs.rent
best-business-phone.cfd
4it.services
visionpath.buzz
wdbb83.top
928storethailand.com
iodjsuihsjcnjbchxbhch.xyz
noonhr.net
beauinthedark.net
tlt.international
ketolifestyle.info
ucsfmdio.shop
bluewavecapital.net
healthcare-software-75681.bond
3829752.cfd
annistonfrancisco.design
ndress-ai.info
kh1swo.vip
98080729.xyz
home-care-19555.bond
aloghelyoon.shop
egmfynkkmpuke.shop
seniorlivingau-kr.today
icavesph.online
bbgtl77vu18s48n.icu
ukmassage.bond
sswhbcybvcffv.xyz
helniu.top
d247.world
5kzdehq.shop
stellamarisadolescents.biz
aplicanolandscapingllc.com
kmjjq.vip
online-dating-62288.bond
kzeconomy.top
byte9.vip
scoobysdog.shop
kribo88id06.vip
Targets
-
-
Target
a3a0f6ef77d8d2270b5baac5ac9185bdf9e30351e61cb6f7a90c76601e004b15.exe
-
Size
600KB
-
MD5
a666dc5c6765f6912878fc840aceaf82
-
SHA1
9f804c5d474f723f6c08cac07569c237c25286a7
-
SHA256
a3a0f6ef77d8d2270b5baac5ac9185bdf9e30351e61cb6f7a90c76601e004b15
-
SHA512
4835ff70937f9b5f0da3e2ff61126255b1da74e7c0be00654e062b9b5463ad10380b1e2952c7ccaf05d9090a03c8a020ec6baf6cd7b3259ab54e3de57582553b
-
SSDEEP
12288:hhr8bQb07Lo2kJc9SkHKksvXYXaGtfTiGEXV9JT6newNcGn:gIEcWSkMvoKGtfTiGAWqW
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-