General
-
Target
488b644255f4294a44d23f772b4ce5d9cf79d4ec26247a00721b22e19389e11c
-
Size
760KB
-
Sample
241008-jexe2szanh
-
MD5
05b29b5b5b6aa2cc033b31cc9ba37fd8
-
SHA1
398f0b0f44560a518076d8d8650d5acb2039b1eb
-
SHA256
488b644255f4294a44d23f772b4ce5d9cf79d4ec26247a00721b22e19389e11c
-
SHA512
e09536b83b72592568f79e6a55e9649093c13c1163aae1d4a175d9921d89156158368e4cccfd5020c1a99ab2666dd445ee383725bdf77beb7a10e7a01c3ee17b
-
SSDEEP
12288:UgUt62HVEkfK9rRF8BW5+PaBM17GbOw1vY+DG1JZXC62zkDzCs/kcfaIIgmTh:UrjfYFcMvM4JvY/XplCkVzqh
Static task
static1
Behavioral task
behavioral1
Sample
OVERDUE INVOICE.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
ge07
mail-marketing2-9946168.live
ouwmijnweb.net
verythingmars.online
rgqhcy.shop
unter-saaaa.buzz
ox.bio
arkside.top
ransportationmmsktpro.top
lue-ocean-bar.group
lympiccat.xyz
onstruction-jobs-49170.bond
andon-saaab.buzz
fdmw.sbs
48430091.top
yuyh.boats
kyt968.shop
pismedical.shop
ocialmediafactory.xyz
inussofa.shop
ision.fit
himenote.shop
eto-gummies-01010.bond
ummpk.online
bx.mobi
werad-neumann.info
polo77meledak.fun
uel-fleet-cards-60697.bond
asaslotzeed.online
media.group
gfdsq.xyz
stralexploration.website
ltraslot.win
-16.net
hellalee-llc.xyz
cz9mi.digital
mea.tech
ools-59989.bond
y94nt6.vip
ubaimports.online
tlantishealth.online
athing-suits-78317.bond
uxembourgembassypakistan.shop
262jpdhkd.bond
38gk910gy.autos
q345.vip
attlesaber.net
alecell.net
blungit.xyz
anfrontier.net
obic.info
erman3d.shop
igxyuje.click
eartestqa.bond
ar-deals-77763.bond
dormy.click
oodchoicemall.net
otelmanagementdegree.info
ental-health-91275.bond
76jys301.top
asecore.net
oursocialbuzz.buzz
amuel-paaaa.buzz
ercadaoshop.shop
ome-care-37159.bond
ruisjob.today
Targets
-
-
Target
OVERDUE INVOICE.exe
-
Size
1.0MB
-
MD5
6ed07d07cf776b88070683adbe3b6668
-
SHA1
6cb4702a3d0eb3f9887b62838772f6f432451caa
-
SHA256
97b4ba35c6feaccb928d2a4921d3f852ca36e70c851fc5edb7ae651efb2a1d61
-
SHA512
27dd5bdf36658c359317812a0ba16ead05991eadf02067831d3278eafa61f197407f1d12bb149dd9c4605afbd8470918d8e53b5595e2e5fdeeaa4c538b5e4c1d
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLJkbOe1vYUdm1JFXC6qzkdzCs3kcZaf:ffmMv6Ckr7Mny5QLaJvYDXpXCivzXm
-
Formbook payload
-
Suspicious use of SetThreadContext
-