General
-
Target
wedmeymarsp.exe.mal
-
Size
699KB
-
Sample
241125-j92y1stmcr
-
MD5
875b5af7b5c56f1913978cc8f535a114
-
SHA1
ce7a41a32572853b609f781e87d99634b9e7a00f
-
SHA256
3f65f8e74e4ced282a3f46df38dc2550abedf3ffebf6d523386902680905a865
-
SHA512
9c60ac8ae33ab71ee7b62c451bfbf44ad8918ba7398f1691bb4b759fd901dec3c8fa39848a45b5455de4756bba82f02e76ee9ea909431a9fa27c654b4dd70c9e
-
SSDEEP
12288:T0VZmK9yx3ASqzgWBYXP5KWcg3AstdkD+gF+G3f6zpjB4ejMp5OxL4SmaeS:oVDQ3ASAIP5Kg3AsTkSgryf4e/4Smae
Static task
static1
Malware Config
Extracted
formbook
3.9
ne
ninaaizman.com
kpwinvestments.com
bday.ltd
nnodwigliefspect.win
xn--fiq20h03e3vbp93bkks2rn.com
www444678.com
tianshicishan.com
dustinzell.com
jassed.com
kcofficeinstallers.biz
545cb.com
pornohiet.com
apexlifeinsurance.com
fewproductions.com
000006s.com
bocloud.ink
tlcef.com
pmcop.loan
whxwg.com
4k5five.loan
rcgld.com
coral-red.com
fredhoelzel.com
pj6677666.com
indigorev.com
viral4g.com
awmannequins-de.com
treasuretrousers.com
championsfootballkcmo.com
threelittlepigs.cymru
bespokephni.com
vietnamcambodiatravel.com
xn--1lqq7iu1fzrcitee09b.com
hiddenyoungtop.com
marfacollective.com
990460.top
xwtv001.com
myultratv.net
totalresidualincome.com
free-iphonex.com
rungo.info
8gordonstreet.com
sixgill.run
agmovies.live
880md.com
hci-rcc.com
yifavakigat.com
kleancutlawn.com
phones.technology
mendzimesoso.com
conejemplos.com
blucr.com
sex-mania.review
coinedge.network
nqk.info
tapiceriatorreshebert.com
zorssarhair.com
okhlites.com
seerenergetics.com
xwxox8.info
cervelo-goodzo.com
heat-deloitte.biz
podplug.net
laparuredebain.com
paltox.com
Targets
-
-
Target
wedmeymarsp.exe.mal
-
Size
699KB
-
MD5
875b5af7b5c56f1913978cc8f535a114
-
SHA1
ce7a41a32572853b609f781e87d99634b9e7a00f
-
SHA256
3f65f8e74e4ced282a3f46df38dc2550abedf3ffebf6d523386902680905a865
-
SHA512
9c60ac8ae33ab71ee7b62c451bfbf44ad8918ba7398f1691bb4b759fd901dec3c8fa39848a45b5455de4756bba82f02e76ee9ea909431a9fa27c654b4dd70c9e
-
SSDEEP
12288:T0VZmK9yx3ASqzgWBYXP5KWcg3AstdkD+gF+G3f6zpjB4ejMp5OxL4SmaeS:oVDQ3ASAIP5Kg3AsTkSgryf4e/4Smae
-
Formbook family
-
Formbook payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1