General
-
Target
123.7z
-
Size
560KB
-
Sample
241105-krvyesyfnq
-
MD5
27a9d57d79da312d652eb1a8e6e16e29
-
SHA1
a283cc7832e38ac3cc679b623d2062653e8b5583
-
SHA256
0ed2742388b2b9e44e5ca08e817ac9a31a020324577ccf47f7c1078a5009df5a
-
SHA512
6a8075e8ce7323528ef9c858935d23b1d38c6dda164aaaf870d0b70eb6655ca9fbc7a27d422b52295af5e9d9be0707338d4e5fe559634b7035f2c0c5e0075c2a
-
SSDEEP
12288:mbB/HqFuF3UjB4ksDlerYDTf2cu1ztnEaWdpBYnbsAfzctugTp1EBr6:mbBCglUSkC9TOcEtEaqBAQ6YogTp1E0
Static task
static1
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
cd36
hongrobert.top
msurmis.online
tormdamageroof.net
riglashenie-svadby.store
otorcycle-loans-84331.bond
ouriptv.info
eportingcfo.top
2019.vip
ysphoto.online
hrivegorevx.info
350yhc.top
mwakop.xyz
antan4d-amp.xyz
pc-marketing-95267.bond
cuway.tours
inshiaward.top
akuzainu.fun
scenario.live
arrowlaboratorio.shop
nline-gaming-13926.bond
uckycmr123.xyz
eal-estate-71071.bond
adofirma.store
370.pictures
el998.top
beq-ytxr.net
ishwashing-jobs-hunt.world
cn.info
scyg.icu
ilca.xyz
nfine.art
idianledger.top
uycarpaylater-02-t1e-01.today
zygm97014.vip
aofkl.top
gro-smart.online
ranino.coffee
ruckingandhauling.net
ikihousecanada.shop
warmsnetwork.xyz
685830426.shop
ourpetbliss.store
issionzyq.site
uanggermany.top
ottostar.site
elding-jobs-snap.world
apsearch.world
an-portfolio.site
atinclubazul.xyz
rojektx.world
nline-advertising-55292.bond
ittlelou.store
sas.live
09ms.com
hl-com-mx.top
ncovc.info
ovemeone.space
otorcycle-loans-32384.bond
aksghfa56.shop
s-nova.net
aycetastytime.online
arkasgaransi.cfd
ome-care-51533.bond
elsyynp.top
amesnow7.online
Targets
-
-
Target
123.exe
-
Size
697KB
-
MD5
6ef6d9ab38e828238dd6b2e31d020098
-
SHA1
2664e77a7b72bad3ed91f65ce33bbe85a31b1e12
-
SHA256
4e7468981f7c2449a90d01304d8404c29f220610d6865ee0e5742b23bbbddfee
-
SHA512
86b8f003a939f29f93de058a47cb0561f6b0a3d9f4ffd9d51d2b800613ebf53a80f0c530f9d9dcab9e250b44d6d94a7c9af3826289475de598211080ec450837
-
SSDEEP
12288:5lxSqVhZfm4/EXm9keTTBkYk6BaGLJkM5iUjZuXgp0xr9NkR8fsbT8fgf:ZSqV/fPZGe3A6BaGLqM5iUj0v9NkSUa
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-