General
-
Target
a8cadacdc044a5e4138f19f5726562160244e2ced4c78b44d8b5991d12bb8b2a
-
Size
231KB
-
Sample
241121-yx578swpbx
-
MD5
5d8e15d12d4523dc517d31d76f52d2a4
-
SHA1
ebdaa62dcd3fc3511c14f26e555d502d757ff853
-
SHA256
a8cadacdc044a5e4138f19f5726562160244e2ced4c78b44d8b5991d12bb8b2a
-
SHA512
0024c313b49d5502219b852ca7f45c99095b35935cbdddf5dffc4f648f26291a293cb7cb99a44c7583fcc446fc95f79fae3f2c98abc46c725b561b470523ce68
-
SSDEEP
6144:Pa5BPlV7QX7GEp9Sge0p7+urCCFd5FYao9AbqpYEL:PaLPlV7QrhCge0Tl5FVoabqpYEL
Static task
static1
Behavioral task
behavioral1
Sample
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
anvnzaoum.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
anvnzaoum.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
henz
IxWMb+jVsoinShuZJzk=
TPfKgQZ//oGnKr/J
EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M
KebSmiCP9p8yUw==
HAt/ljkEuqMLHOLCi53Pv8MKX9qk
CY4ogZTwJc4vSw==
WWDIx5UYUDyepntE0YIAPca3/rI=
+Pkr01Lfb2rME7bL
S5nyK0p8jS2xdwQ=
W/oqvlO57LfkLcLHnQ==
zrrwtqkTLwxulm4l8FGopw==
AqucYext8bzFbOKthIm8E6gfVkUHxKY=
OfnjeDs78+RTcz4OHRl+
XKf1wwpZR5hLLjHgmUGOpQ==
JMyhSLoJPTCwn5o9zX2d8i1+
Wk54MBsDhWSVbnIRkQ==
7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==
hH/EYxN+jC2xdwQ=
S0F4ORqDjS2xdwQ=
0o/UwXnuJ+sJp0cOHRl+
klE+E/jVelhT72wOHRl+
ZGvqyzaT9qfME7bL
czgajHaygm4=
KufYeyTiLhIGlzU6/38IM7IrqzhFa64=
oVNF+2VXWBL9jwGsK3Bw5TE=
iI3g6JaEalRvMDaz8AD4+vt0
nWtRAaSccRlLVg==
NtvDoS2UMcMRSA==
1t5MW/lEfjsUrFJeGXBw5TE=
UFixmi+P2cgqPRj09Sc=
MSuTonT5QhU11IGFYWKB6eJj
k4Lw3r+hTj9NF8+zgnu+Nsa3/rI=
NSN7fCqHln/S+RuZJzk=
dTUV1GY97NlVLsaSJXBw5TE=
8u5OLgNPRShyRRuZJzk=
BLTZ0G3iV0B5PvedL3Bw5TE=
ci8Y27nGCM69
JxF8W9/QoC2xdwQ=
KusZC8MsPClL1oMo8SA=
tW9XIP/VYTmVpWIDjIu1p5/ebhC9
pmc//mhFFgx3l1IOHRl+
MOsl9G5hQT6lhc0oLHWtrQ==
fXvSx46RRSiGjWphOnO0p8a3/rI=
D8Hx4JoDG+znbnIRkQ==
Dsfu2pqFJP0Kv0gX1CGX3Sw=
FcGnEr4fhW7ME7bL
hkc37Y3GF8gTMAw=
dnGZWjqPqYqgTxuZJzk=
iDEV43sIvE1j7psMiQ==
vb8qEoNQBus+mQXst1h2
46qCRt3j3cfneiudJjE=
8eoYvzW2PgDrffLWrav++Mf1TUUHxKY=
vqkFDa0HYztZ+G8ODZ7Qug==
+K/F0qEnTxACrzMR2OocXxecmq31afw7pQ==
Egwn/u1rq2uVbnIRkQ==
nFVH/3fvalaRbnIRkQ==
CvtveEUyyqUJLOiOKnBw5TE=
dmfN5LErTj9l/Icl8FGopw==
VAQtEMawYiNPaTxLIxdbpD9sZL0=
MBSMhSCOHdpCVQ==
jz95eCeaJc4vSw==
85N/Gcy+XicYq0cOHRl+
D/1B46soVTKObnIRkQ==
Hgytgwn25KqyVRuZJzk=
brennancorps.info
Targets
-
-
Target
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8
-
Size
242KB
-
MD5
4a1c5227914a9c9282c5dcd651a0ccbe
-
SHA1
f4e41cd45bd8786b22dcae6c78c94ec9f2a810a0
-
SHA256
9afee5e6dd1d97f008641020ac405b40512c4c8f3ac1a9ee278eb75d18556bd8
-
SHA512
9919d1ce07cefaab0b09b9266f01b4983cc2b7d0e8940f9eac0c6e27c471da0e619238fd15c79925471c9658930e59b118a693809b3c8121918eda39fa1af115
-
SSDEEP
6144:LkwMj35iWQXLGEp9Wge0p7+ubCCFd5VYaoVAbqpYEe:i34WQbhmge0Tl5VVoibqpYEe
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
anvnzaoum.exe
-
Size
49KB
-
MD5
ad7b04bf79722139410e67334277fb3b
-
SHA1
df89d32ebf661b167032342db2a99d9d71279cf0
-
SHA256
75f11c547a4b59ce61b7b920bffabe67c0b0fc763b9e85e3db385c8c7207c2bb
-
SHA512
457e541e5d474441038af606b408af5a70f6bae6f87bbe4ab5d8b5ab753793c72c5ae742647d3c27b17070057319ec435fabe1218acbe49be315def29685610f
-
SSDEEP
1536:cjjouox7Qn6FqDL4CMY+GsWNMr/5PP+5w:0jos6CL4C2WA4
Score3/10 -