General
-
Target
inquiry.exe
-
Size
1.1MB
-
Sample
241125-av6tzsyjfx
-
MD5
bdcaea5a90a95e1ac6e710c7eb59d6e5
-
SHA1
41ad452e6ab3a2d3ff745b4936623e426a9a882e
-
SHA256
4bf978ec447793b5945d346db1d2c4f9585cd9314071f13a79bb070577419696
-
SHA512
48dd28be3df0d5c8c9fd1e8f091c1827d8b3686406550d3f25ef32a9b5bc1da50a5a812c4daa9744adfd6655d8165b0d2ce8dc42b4819cfdb6c1f792bcdfa3aa
-
SSDEEP
24576:ztb20pkaCqT5TBWgNQ7aKN00yvWi8JXIREMs6A:wVg5tQ7aK6DSlV5
Static task
static1
Behavioral task
behavioral1
Sample
inquiry.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
cl21
0001.shop
earch-parttimejobs.today
are888.top
akanhaunthipped.shop
othing-heyu.xyz
cadvirsor.net
nclanalae.shop
lectric-cars-mexico.today
oxj-question.xyz
ersonalloanoffers.today
ersonalloans-fo54-fo37.click
verybody-ewfx.xyz
ercuremontauban.media
azilimdunyam.net
airs-clinicato.today
wiftsscend.click
ertainly-jbws.xyz
8xeng.app
damekadmitageable.cfd
ollapsedec.shop
mpldo.app
g18q29a.top
etaddiction.tech
lbatasalboinamoco.shop
eyyzj-medical.xyz
ote-lmeg.xyz
cellelukacs.shop
evinedesignz11.net
n217.vip
eimy.top
ellisimaa.shop
hjk-west.xyz
nline-dating-be-10.today
wocykmw.top
ytsxv.xyz
iding-lawn-mower.today
olarpergolasolutions.today
ainco.net
r86yd.top
ndrvb-stock.xyz
ing88vn.today
vez3.xyz
fg-am.pro
ultplanlz.click
ecurebet.click
fjng-court.xyz
rsenalatamanaxweed.shop
iaoyingtao16.vip
rime-kvsff.xyz
ufdd-interesting.xyz
qbdl-base.xyz
ushihq.xyz
400108pptddbo685.top
tself-gqemlq.xyz
uyher.shop
ffprintshoplv.shop
ushyniceneobaza.cfd
dmrroa.net
ar-deals-ca-8966160.live
ramx-jorv.top
ifw-less.xyz
hwisdom.net
xrjgq-prepare.xyz
rchertravel.click
ingledatings46.xyz
Targets
-
-
Target
inquiry.exe
-
Size
1.1MB
-
MD5
bdcaea5a90a95e1ac6e710c7eb59d6e5
-
SHA1
41ad452e6ab3a2d3ff745b4936623e426a9a882e
-
SHA256
4bf978ec447793b5945d346db1d2c4f9585cd9314071f13a79bb070577419696
-
SHA512
48dd28be3df0d5c8c9fd1e8f091c1827d8b3686406550d3f25ef32a9b5bc1da50a5a812c4daa9744adfd6655d8165b0d2ce8dc42b4819cfdb6c1f792bcdfa3aa
-
SSDEEP
24576:ztb20pkaCqT5TBWgNQ7aKN00yvWi8JXIREMs6A:wVg5tQ7aK6DSlV5
-
Formbook family
-
Formbook payload
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-