General
-
Target
28775ce1bdb5ca7b38745997d9c843f3ff46143879a2cd9f9c5be68c0b238ceb
-
Size
214KB
-
Sample
241121-ylp2wawkd1
-
MD5
2b9caa2d11deea29583c3f060bfeb537
-
SHA1
53487d9a9b9fa859e179b440f9b90c6921540f04
-
SHA256
28775ce1bdb5ca7b38745997d9c843f3ff46143879a2cd9f9c5be68c0b238ceb
-
SHA512
201e514987c7bf5b5ecdc90327a8314c2a3f03134ab9e6b4841f0f1c72b2ff91e404c4a65984c543241e68eca42e18d5d42c438c7ec979025856f4fac2b23679
-
SSDEEP
6144:wpkqVBAclfjaA4hA9kOWByr5HDx15npNNsAV4UZB2v:0v94AkTItt159pb2v
Static task
static1
Behavioral task
behavioral1
Sample
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
rqpwm.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
rqpwm.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Targets
-
-
Target
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700.exe
-
Size
225KB
-
MD5
ffd1f23d797e701acd68c6fafc43ee52
-
SHA1
9d50d54229d7b5c77ef2ff5b2e8383d857a72c78
-
SHA256
b304ea7c0c21af9a1e1787461fb6577cd05a358fad427a8c33a531449928e700
-
SHA512
7ce85f0852546659ff88c74649885599926ad99705afa70403d8f925248c954350b4dec3383e0f9e0aa61ded75b13416dc217eae2064cb3992ed3a67e98b352c
-
SSDEEP
6144:LkwmZ9d0kAbVgQgvIb3w/zpxuDee5rFrTFFkvyIu2:4Z30b8qARe5ZrTkvyk
-
Formbook family
-
Xloader family
-
Xloader payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
rqpwm.exe
-
Size
65KB
-
MD5
c7b994bf4057f869fbf0fdd87058a5b1
-
SHA1
49cd3cb0e992b570ddfb82ee539c91e924fae42d
-
SHA256
9713a086074e9951c6ba4aff6f801c62ca11935aaea623047f21c6b1516174ac
-
SHA512
b3d511e62c54aa201d00b83e520b714efb295a39030b98558d88b499e90b1d2606ca58dbb3aea4e602912ada7c9582738083ae44890b2a183a262bacb8d1b0d9
-
SSDEEP
1536:BIAqBDA3log/a0JD0LMqkADk+8+mjk6qKrOqzCJ:atA3pHDKM8Dk+Axr/CJ
Score3/10 -