General
-
Target
13a743db77a54ff14ced8a949be8a503f65962cd7217155fd662481733c0316e
-
Size
398KB
-
Sample
241121-zemtlsxmaw
-
MD5
2aed2d73627ef548674c462fb6c8697f
-
SHA1
57fe4dcc4cd1a304e6f1c2c7d27ac462778f61ac
-
SHA256
13a743db77a54ff14ced8a949be8a503f65962cd7217155fd662481733c0316e
-
SHA512
590bbbcce0d8cdcded306c92a0dd68a4f4b140aad8aeb5c1ffd2e5f095e3810ebe1843ab621a9b602638d271dd6a8b689de14ffce268e3c8a731a382a8f5dd68
-
SSDEEP
12288:KaCI5jAS2vxqeZe5fh7NfdtLuCWtMiYz3aKC:3CI1n25qeZGfh7TwCW6iAqx
Static task
static1
Behavioral task
behavioral1
Sample
Invoice NO 22073895.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Invoice NO 22073895.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pvwuec.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
pvwuec.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Targets
-
-
Target
Invoice NO 22073895.exe
-
Size
486KB
-
MD5
85cd688a9fee95b88b94b6879039201f
-
SHA1
0843488b993fd26651cff415ac5a43c593defa25
-
SHA256
4d3261b30e45d9577916b421a9b829836e955a9be539866aa29d21aad01283c1
-
SHA512
9ed65a00f4e6c276b18778feac6140759ebbc159d15c4c20280ff13b1887c73ec4fc88a38abe0f8e0d75ec0e5a5acf82478472b761247bee1357d130bf80ab45
-
SSDEEP
12288:AYn68Ex+E5Z8kJqeKPMwwOfGo5KNfhtDuCytMi4zaaKL:AYn6DAEgIqecuo5KbsCy6igbG
-
Formbook family
-
Xloader family
-
Xloader payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
pvwuec.exe
-
Size
84KB
-
MD5
e87c6c672ec024582ffb00811abf747e
-
SHA1
05921c941ed33b6e0e4cd35c20a452d0659d04dd
-
SHA256
17a23dd9b5a1b36f5db90ea4e102a03a8dd14557b60f4c19c17e62e53ac19f86
-
SHA512
5d09656b375b7cb2a3e3062e4a4af3c77663cc454e79a7be59f2996b4db54e8609f6de7b0ad27432e42b45f2e544a22ba43096b61be6d06d36ff1b20b1e49cb5
-
SSDEEP
1536:gv/Fb08hIFKD8jt+X5tNYgpWtEaXkNGw4vUODaB9cTryEDuubmfs7jzH:q08hqKiARlpWtEaXkNGBUODs+yEDXFjj
Score3/10 -