General
-
Target
1.exe
-
Size
1.9MB
-
Sample
240927-kxdlbsvbmr
-
MD5
a68c8ccf6f70c4622934f393c98ae260
-
SHA1
27bae542d40db10cd929f2929e10b1c3b601d2dd
-
SHA256
90c4a79982a1f7b075a45d7bc7d23b5e0ca8ee5348b8762bb301364de22ad33c
-
SHA512
6caef4118a743e72c979bc33fdb06d055fb80ad0a8a5428bcce511cb0754d404d7aa3a5821941f03c2dcbfd04dcf83f33cb7b69ce0233aef014fac029025e233
-
SSDEEP
24576:DEx18OfetnSwHwd1rWKLrcpSgZaUZflrGelKNLJygCF:
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
e62s
ellinksa.shop
uckyspinph.xyz
owdark.net
arriage-therapy-72241.bond
w7ijko4rv4p97b.top
heirbuzzwords.buzz
aspart.shop
ctivemail5-kagoya-com.info
shacertification9.shop
zitcd65k3.buzz
llkosoi.info
ru8.info
rhgtrdjdjykyetrdjftd.buzz
yschoollist.kiwi
oftfolio.online
rograma-de-almacen-2.online
oudoarms.top
mwquas.xyz
orjagaucha.website
nlinechat-mh.online
nlinebankingrates.net
3llyb.vip
42du394dr.autos
ahealthcaretrends2.bond
gbox.net
anatanwater.net
amearcade.shop
ighrane.online
01599.xyz
ams.zone
-mart.vip
42bet.xyz
6snf.shop
nitycacao.shop
arageflooringepoxynearme1.today
c7qkaihvsc.top
amingacor.click
airosstudio.tech
iktokonline.pro
homasotooleboxing.net
ashforhouse24.online
1539.app
atangtoto4.click
ndex.autos
atorengineered.tech
angkalantogel.company
ajudepo777.top
jacksontimepiece.net
gstudio-ai.homes
unter-saaaa.buzz
atageneral.sbs
ingston-saaab.buzz
i5t3.christmas
ampanyaak.click
dneshima.today
angbaojia.top
ubuz.net
pp-games-delearglu.xyz
insgw.bond
7f243xb.skin
roliig.top
wdie3162.vip
reechagroup.vip
op-phone-deal.today
orsaperevod.online
Targets
-
-
Target
1.exe
-
Size
1.9MB
-
MD5
a68c8ccf6f70c4622934f393c98ae260
-
SHA1
27bae542d40db10cd929f2929e10b1c3b601d2dd
-
SHA256
90c4a79982a1f7b075a45d7bc7d23b5e0ca8ee5348b8762bb301364de22ad33c
-
SHA512
6caef4118a743e72c979bc33fdb06d055fb80ad0a8a5428bcce511cb0754d404d7aa3a5821941f03c2dcbfd04dcf83f33cb7b69ce0233aef014fac029025e233
-
SSDEEP
24576:DEx18OfetnSwHwd1rWKLrcpSgZaUZflrGelKNLJygCF:
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Formbook payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-