General
-
Target
malw.exe
-
Size
557KB
-
Sample
241015-r7aqravark
-
MD5
382c88984b3c6ee204de52753ef3430a
-
SHA1
6a3e055ed4b30137798e379408894298d6caf652
-
SHA256
0c75f9346023e418ff8265fb609a392086a32d894482fad2426e7993467e0eda
-
SHA512
e5b9658766c195274d41869253ded042cb8c8d7c2f9439b7ee3335bc049b4b1d6ef14ed86f78d5a7de67fbf2ea16d542db151924ef2c9f4293204ce9d2cde2fa
-
SSDEEP
12288:7bUSAWFHil5oqaWB1meO4pT7eTAqLySHqiO/B/rbKbp/zF8PnEh2vo1:7bAkCEqaW/mZkT7gAMKL/6p/GEum
Static task
static1
Behavioral task
behavioral1
Sample
malw.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
t18n
tmusicoregon.net
atici.online
j7u7.xyz
iewunucierwuerwnziqi1.info
ruvabetgiris.website
acik.lat
obsk.top
sphaltpaving-ttp1-shd-us-2.shop
ispensarynearme.news
b3nd.bond
urelook.xyz
gearlpfbm.top
aconstructionjob.bond
killsnexis.info
oshon.xyz
ashabsxw.top
ussiatraiding.buzz
raipsehumus.homes
6ae23rx.forum
edar88vvip.shop
47-nurse-92864.bond
p4g6.xyz
kymacaw.net
amedepot.shop
hekindclub.net
remiumpetsupplies.net
enisekran.xyz
pacerpa.shop
milelab.pro
mlibertypac.net
yflume.net
lecrtort.net
destramentoemcasa.shop
atubri.info
hop-gb.sbs
entalcar-onlineservices.lol
aylocnuocionkiem.website
oliticsclickour.xyz
eo-company-abc.online
efoplin.xyz
ndisec.net
ain-relief-728.xyz
essislotgoal14.xyz
1ngg4hdiwt5.shop
avada-ga-20.press
earing-tests-49842.bond
dnusaunni05.sbs
sim-for-travel.today
lotehupi.shop
bresz.xyz
ozyjtmt.christmas
awersip.xyz
unihbahis.net
ndustrialrichmond.best
isdom-sol.xyz
iden-paaaa.buzz
32xa544mg.autos
ental-health-89041.bond
uylevothyroxine.online
olar-installer-job-at-de2.today
usiness-phone-systems-6543.bond
77.info
enaydereli.xyz
pjn.xxx
xhibitonenotary.info
Targets
-
-
Target
malw.exe
-
Size
557KB
-
MD5
382c88984b3c6ee204de52753ef3430a
-
SHA1
6a3e055ed4b30137798e379408894298d6caf652
-
SHA256
0c75f9346023e418ff8265fb609a392086a32d894482fad2426e7993467e0eda
-
SHA512
e5b9658766c195274d41869253ded042cb8c8d7c2f9439b7ee3335bc049b4b1d6ef14ed86f78d5a7de67fbf2ea16d542db151924ef2c9f4293204ce9d2cde2fa
-
SSDEEP
12288:7bUSAWFHil5oqaWB1meO4pT7eTAqLySHqiO/B/rbKbp/zF8PnEh2vo1:7bAkCEqaW/mZkT7gAMKL/6p/GEum
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1