General
-
Target
70dbab524fe34329b60bd081119cb8a018620490f9c94bd9090c75f53d635bd9
-
Size
769KB
-
Sample
241030-bgb8wssjgt
-
MD5
5036cbdb58a63f7764d9940b733a430f
-
SHA1
ad47be39e1a336ded1ee37eb439851fcd3b73a15
-
SHA256
70dbab524fe34329b60bd081119cb8a018620490f9c94bd9090c75f53d635bd9
-
SHA512
8180ad414d501c9ac73f63038a09f7c456ee9eb95bf1926e9ecd3c132f7a4306d83cc2a6ce2c7e15bf74191a792852cf2989427f0a509a60dd170ec9122bdf2c
-
SSDEEP
12288:mgUtzYNnB5fnbmOQudrL4I/Q5WTWYweXdZ8i8Zgwz0+px0WPazlPImocJO0vJ:mlYhPmOBR/gWTdV8ZBxz0KIhoc/J
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT_MT103_Payment_552016.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
f29s
rostnixon.net
exxxwordz.xyz
ndradesanches.shop
eneral-vceef.xyz
isanbowl.top
aresrasherregard.cfd
dzas-yeah.xyz
0083.miami
hongziyin01.top
jdhfmq.live
alembottling.net
vtyo-phone.xyz
kaqb-decade.xyz
odel-lsmfz.xyz
aradise.tech
uan123-rtp43.xyz
pusptracking.xyz
uqhi42.xyz
mihy-professor.xyz
mnz-your.xyz
iscussion-tjard.xyz
peak-ajau.xyz
ixedcontainerlogistics.today
ranxxletzz.xyz
ccloudserve.xyz
haloryner.website
ro-arenamega.pro
tjcb-wait.xyz
lywjv-issue.xyz
rta-away.xyz
ay888.website
asderkadinkollari.net
specially-smou.xyz
ound-qlhmm.xyz
nit-dreeu.xyz
ea-obgocc.xyz
rostavive-org.xyz
zpp-at.xyz
duxrib.xyz
uohz.net
etsgroove.app
awqs-wonder.xyz
acaxtecameralcarers.cfd
idstream.xyz
umayunileusesingests.shop
avada-cash-out.tech
byataltatweer.net
omething-nvho.xyz
yntomist.pics
aomei517.top
how-ydhtlu.xyz
ise-bjnh.xyz
ovt-jobs-lisitings00810.today
mmgiare.xyz
plqz-move.xyz
onheronummaryorkney.cfd
oqo-over.xyz
aee.pro
as-nhynby.xyz
dnaqm-walk.xyz
aranvickersvirilia.cfd
wqvn-environment.xyz
attern-equd.xyz
ivinetranquilityjourney.pics
kimosskrupulslacker.cfd
Targets
-
-
Target
SWIFT_MT103_Payment_552016.exe
-
Size
1.0MB
-
MD5
60a57797ade75acc0d71768e593d28c0
-
SHA1
f407c263e902d95f14c6994d90fc836140fdc622
-
SHA256
2369682a410e0b6aee1180d411eea77ee8942c58845f28d6afa79a1b5b4152ac
-
SHA512
03d6ab578683025020577bc215f932f692db712d4a140d1d46d563291b49c86eecbe80fe9c82ad01973a6df066e2b3b0a13fbfbedba75a33e0c4bcc09ce1f706
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLPJLX8ZJxzG0I7ochL:f3v+7/5QLBU707dL
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-