General
-
Target
e-dekont.bz
-
Size
595KB
-
Sample
241107-scvccawrgq
-
MD5
b6d62a75a10350ca973bf53784fbf947
-
SHA1
466ddd3adf7e7f99e9b7a17c681e19d44d71d211
-
SHA256
829bc2efd2477bb2786768e62c9ce63531bad7f40db8d8f311c9312d9d9fe757
-
SHA512
732df4feae1e093dc023c9a37fb1e0c3eced4f7299831ef5c61ae93ed82241258f94f6cefdbc18c98168ae8df9d9584811cc9dcea668a0a8d8c34ba1fca8e89e
-
SSDEEP
12288:nuTO12sgKtduhOSW5qKzh5N2nW5WBAZjW3KOL70xF3+00o79rhR:uTOQsgKtdbSW5zzYnbWZC3l0xp+He9rj
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont.exe
Resource
win7-20240729-en
Malware Config
Extracted
formbook
4.1
bc01
epatitis-treatment-26155.bond
52cy67sk.bond
nline-degree-6987776.world
ingxingdiandeng-2033.top
mberbreeze.cyou
48xc300mw.autos
obs-for-seniors-39582.bond
tpetersburg-3-tonn.online
egafon-parser.online
172jh.shop
ltraman.pro
bqfhnys.shop
ntercash24-cad.homes
uhtwister.cloud
alk-in-tubs-27353.bond
ucas-saaad.buzz
oko.events
8080713.xyz
refabricated-homes-74404.bond
inaa.boo
nnevateknoloji.xyz
ar-accident-lawyer-389.today
ianju-fvqh092.vip
ealthandwellnessly.digital
qzxx.top
q8189.top
ecurity-service-22477.bond
ractors-42621.bond
astamadre.shop
tonomushotel.xyz
cowatt.fun
olocaustaffirmer.net
delphi.ltd
mmwinni.buzz
8009.top
nline-gaming-ox-fr.xyz
irtyeffingrancher.info
omotech-dz.net
akemoneyonline.bond
ustbookin.online
eals.lat
irmag.online
eddogbrands.website
oifulcares.net
aming-chair-83359.bond
ewferg.top
areless.net
torygame168.online
y-language-menu.net
iring-cleaners-2507.xyz
inancialenlightment.info
ar-accident-lawyer-389.today
sicologosportugueses.online
ajabandot.website
oidakings.net
2ar1.shop
comedia.lol
kjbrosmm.shop
ffpage.shop
nfluencer-marketing-17923.bond
ebshieldsrenew.live
lkjuy.xyz
lussalesapp.website
hildrens-clothing.today
avada-casino-tlj.buzz
Targets
-
-
Target
e-dekont.exe
-
Size
739KB
-
MD5
d81b47b60f4ab72d26d70eed50f4b72a
-
SHA1
16b85b52a3db23ad7f7e297b3d270ed5100f34c7
-
SHA256
94f858ec5529f4f52ae1bed542d9a38b2ab7e4be0446c4d9252f0de3d7cf2dce
-
SHA512
8b1480c5ec7f7fd3ee8cbfbb0f446e244b41a08d4568c0fc17894ddc314252a83bedc50ebe815429e737201653273c641becd75416569b999ac1226a937ca996
-
SSDEEP
12288:AgWVyEsrM2W0RPDGFbSSSAn+MHkTn4PVwD+iEmNg1B/dEmbGqpJ:9WVyEmMH0qkA+MHY4GDZE11RSmNpJ
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-