General
-
Target
86d39ac67f5f562734b73ab49c526b0d692451ae300e94112d1f5976a352628a.zip
-
Size
739KB
-
Sample
241109-dmcsqavqaw
-
MD5
1005a72da038cc16f3021f755d88dfd6
-
SHA1
890d0938827ea2e4d0b6eba0375ba92626f234cf
-
SHA256
86d39ac67f5f562734b73ab49c526b0d692451ae300e94112d1f5976a352628a
-
SHA512
e2bf47c4b21a8ec4b0bebeefce6a373be29cf3714d61a38031189971c6e0bc96f6666cda835c23237f41789244670419049ae4b6dd5add1ce13fbafdf3421a2e
-
SSDEEP
12288:NxdMWfZlo8aEzLg/YcYhWfOxDZRk4xYr1sWXHWDYLS6GgwGHcha3mHiD:Nv7fgpEvLcYcOxgQc1sIHmM2G8he
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
dn13
5q53s.top
f9813.top
ysticsmoke.net
ignorysingeysquints.cfd
yncsignature.live
svp-their.xyz
outya.xyz
wlkflwef3sf2wf.top
etterjugfetkaril.cfd
p9eh2s99b5.top
400108iqlnnqi219.top
ynsu-condition.xyz
ndividual-bfiaen.xyz
anceibizamagazine.net
itrussips.live
orkcubefood.xyz
lindsandfurnishings.shop
ajwmid.top
pigramescentfeatous.shop
mbvcv56789.click
rmei2-cnpj.website
81uu.top
cis.services
ptionsxpress-17520.vip
ltimatraceglow.vip
apu4dmain.cfd
hckc-sell.xyz
nough-smae.xyz
fsoiw-hotel.xyz
mile-hkajwx.xyz
ay-hbcsg.xyz
articulart.net
ozezae7.pro
asy-jatcrz.xyz
wiftsscend.click
tinky.vip
ould-ktlgl.xyz
vagames.pro
sncmk.shop
trategy-eyewna.xyz
orty.pro
hanprojects.tech
ronsoy.vip
aoxiangwu.top
8tsl.fashion
ashersmeaningmellitz.cfd
ood-packing-iasehq19x224.today
oldier-zjfuu.xyz
ysterywarrior932.top
omercialec.shop
ashclub.xyz
trongenergetichealth.top
addedcaitiffcanzos.shop
ack-gtiij.xyz
nformation-gdrs.xyz
ouwmsoe.top
apermatepens.net
5i34whsisp.top
appen-zuxs.xyz
trennebaffinbayamon.cfd
nablerententeewart.shop
xpert-private-tutors.today
zzw-tv.xyz
ffvd-traditional.xyz
31231851.xyz
Targets
-
-
Target
Quotation.exe
-
Size
773KB
-
MD5
4c38d69491c3bc94e2348af4447917be
-
SHA1
b8c6225c52f8c81031e735d5b87daf26b0348e63
-
SHA256
4b50c23f9c20e569699daba5b9f13a3f5e7e3b9977e38b105aff0c8b18fcba70
-
SHA512
c1a28aa883c0f6315667c35f539379779fd7e9dfa6956272b9a64dc1475622a7e24246b172a2c3bb03dde73b4d6986cea4b07100505f6beb9d027dc086c29ff3
-
SSDEEP
24576:4rMoei7fgfET/cic6x42c7s8TwMKGwhFjoBK:4ocIET/ttcRwMejP
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-