General
-
Target
24102024_0538_24102024_нова поръчка pdf.zip
-
Size
592KB
-
Sample
241024-gb5k5swbnh
-
MD5
a3029f0cb8d6757993d43f5b84ce6049
-
SHA1
ae1feb6430225d7a8c49e387042808d4a2ef98c5
-
SHA256
c9e266773311e6731f59e0b24b62a6398898bc98aa84fa84344bcfcf55856d23
-
SHA512
a4098e99b81b03fea3cb1025249369a93e64d8cb5b9c44932d4d53231fd87ca7a36bcb1c03ab689da9bb91385a32da0329955ded9523a056791516ebc70079a7
-
SSDEEP
12288:83UC1caqR/m3YjiNo1uOAY5WXvNKmMrspGzDY8T7QgZv5S2R6ZpQQYSW:dyc1R/m3Yac3AY5y0brspGX9UgVEC6Zi
Static task
static1
Behavioral task
behavioral1
Sample
нова поръчка pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
gy15
hairsdeals.today
acob-saaad.buzz
9955.club
gild6222.vip
nline-shopping-56055.bond
lmadulles.top
utemodels.info
ighdd4675.online
nqqkk146.xyz
avasales.online
ortas-de-madeira.today
haad.xyz
races-dental-splints-15439.bond
hilohcreekpemf.online
rrivalgetaways.info
orktoday-2507-02-sap.click
eceriyayinlari.xyz
lsurfer.click
aston-saaae.buzz
etrot.pro
68mp269rf.autos
ndia567.vip
jinni.buzz
rey.app
enior-living-72184.bond
rogramdokpirdarmowy.today
ejcloud.info
ools-59989.bond
astbiz.net
ixaahx.shop
hqaiop.xyz
indow-replacement-46487.bond
rogramdokpirdarmowy.today
remoter.net
ecorationworld.net
ilkool.info
bandoned-houses-50880.bond
andscaping-services-2507.today
42ve.shop
orthfitness.net
ink-gluwty.online
18721.club
ahrump.homes
uuxe6hi1l.lol
hopbestdeals.online
rocbotserver2.online
8210.app
oftware-download-44761.bond
78ex.net
lake-paaab.buzz
olocal.app
oxpal.best
hetinkerfoundation.net
eleerm-czjp.top
omaininformaniacion.fun
ahadevindia.info
j11.online
isax.xyz
lennjones.shop
48691640.top
6747.asia
stralvoyage.website
aihora.info
0372.photo
asposted.online
Targets
-
-
Target
нова поръчка pdf.exe
-
Size
612KB
-
MD5
a2769ba56f8b84de34deee154f4bfba2
-
SHA1
01771e5df223fac2315e8ab9ba72234a1a41f0ba
-
SHA256
9f7da651412232824c868086dd48a7d63af0dbb007cef4db8c24edda9b2fcdbb
-
SHA512
57ae3e2b4c4b47a6662c6ff8e91d95d0c807cf6a25757c9f6e4cb4f2f377746ac468cdaa1bd298679a6d70bc4dd91ef3f78444f8d7b9cdfcfdf71d3a428f2752
-
SSDEEP
12288:lCfia8t/w3ENiFovuGAS1WDv8mMrIJTxzDYKTX+grvLU2PI5WytkT7:lYibt/w3ESwXAS1U8brIJdXJugDYMI5C
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-