General
-
Target
Swift_92be67ab-e027-4955-b6fc-64bd720.exe
-
Size
1.1MB
-
Sample
241004-kqfr4sygkf
-
MD5
b5687b090278f6446be5046b802dd2a0
-
SHA1
5ffcad717c3ca822aed7a6e7eb311e43f8ccc294
-
SHA256
94ed3b01fe4b13ebd1d354f87387a8b09ca26829115306b86bbdc2d1d07a0b3e
-
SHA512
31a633db41275c8c19614de0a09550e993206189c898ee1e21bf76f05c5a363b8e3da0e08a1bf54a706b90e85891dd639dffe836ec482ca2af5b07191ab0f375
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL9uklsL2aRnGnJXgVuy6PG+ROusD:f3v+7/5QL9uk69W26RRfsD
Static task
static1
Behavioral task
behavioral1
Sample
Swift_92be67ab-e027-4955-b6fc-64bd720.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
e62s
ellinksa.shop
uckyspinph.xyz
owdark.net
arriage-therapy-72241.bond
w7ijko4rv4p97b.top
heirbuzzwords.buzz
aspart.shop
ctivemail5-kagoya-com.info
shacertification9.shop
zitcd65k3.buzz
llkosoi.info
ru8.info
rhgtrdjdjykyetrdjftd.buzz
yschoollist.kiwi
oftfolio.online
rograma-de-almacen-2.online
oudoarms.top
mwquas.xyz
orjagaucha.website
nlinechat-mh.online
nlinebankingrates.net
3llyb.vip
42du394dr.autos
ahealthcaretrends2.bond
gbox.net
anatanwater.net
amearcade.shop
ighrane.online
01599.xyz
ams.zone
-mart.vip
42bet.xyz
6snf.shop
nitycacao.shop
arageflooringepoxynearme1.today
c7qkaihvsc.top
amingacor.click
airosstudio.tech
iktokonline.pro
homasotooleboxing.net
ashforhouse24.online
1539.app
atangtoto4.click
ndex.autos
atorengineered.tech
angkalantogel.company
ajudepo777.top
jacksontimepiece.net
gstudio-ai.homes
unter-saaaa.buzz
atageneral.sbs
ingston-saaab.buzz
i5t3.christmas
ampanyaak.click
dneshima.today
angbaojia.top
ubuz.net
pp-games-delearglu.xyz
insgw.bond
7f243xb.skin
roliig.top
wdie3162.vip
reechagroup.vip
op-phone-deal.today
orsaperevod.online
Targets
-
-
Target
Swift_92be67ab-e027-4955-b6fc-64bd720.exe
-
Size
1.1MB
-
MD5
b5687b090278f6446be5046b802dd2a0
-
SHA1
5ffcad717c3ca822aed7a6e7eb311e43f8ccc294
-
SHA256
94ed3b01fe4b13ebd1d354f87387a8b09ca26829115306b86bbdc2d1d07a0b3e
-
SHA512
31a633db41275c8c19614de0a09550e993206189c898ee1e21bf76f05c5a363b8e3da0e08a1bf54a706b90e85891dd639dffe836ec482ca2af5b07191ab0f375
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL9uklsL2aRnGnJXgVuy6PG+ROusD:f3v+7/5QL9uk69W26RRfsD
-
Formbook payload
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-