General
-
Target
0220dc58a3d0e4335523e39b8886eafd4f23aca08020f6a7bb2e2eaf1f9d54d5
-
Size
700KB
-
Sample
241127-bdnshsymet
-
MD5
61a754eba297771b83efa54bc6bfd37b
-
SHA1
f9e37e49057d6c5cbe6b714cf1a6fad27fcabbb4
-
SHA256
0220dc58a3d0e4335523e39b8886eafd4f23aca08020f6a7bb2e2eaf1f9d54d5
-
SHA512
76df3736a26402e182e362b2c5ebf662d8c1092a0b4ee95522000ed2d038080287ecb760d426197950281392c9a154ea00674ee9d3e20e029ac66064759b0694
-
SSDEEP
12288:EMGAGpPhWKi9WGGN4nwjBWVd5beSMABRmKNxuO5+r3lMj/qgs8M63:Ezxi9winw9kTFJRm+r+Llu/qzLS
Static task
static1
Behavioral task
behavioral1
Sample
PP-200446-FDA.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
py25
ezani.fun
rsteknik.online
200mzeus.digital
5497.one
ragonflyers.biz
rome.photos
2142.vip
ise-en-mots.net
tickmangifts.store
thostransporteselogistica.shop
utomation-tools-36376.bond
okyo-tax-expert-459376580.today
azettellm.school
aafarzaneh-emer6.rest
aakoub-mc.xyz
linko-es-playmarket.store
ohr.xyz
ejic.online
iwagarden.net
ealip.net
ixsgah.info
arehouse-services-45615.bond
f6zh79i92.icu
kjhtr.xyz
7bet.rest
lazinglayer.net
eeef.asia
emsys.xyz
andscaping-jobs-41537.bond
uykishore.tech
7192024.xyz
alentmatters.xyz
oftware-download-34135.bond
evimli.biz
vfyvjt.buzz
utomation-tools-19980.bond
spnews.online
enang123play.xyz
laygroundequipment1.online
rginine-09.store
ata-protection-86943.bond
oews.xyz
martlink-snap.pro
26a689p.xyz
etfi.xyz
luckyourmeal.store
zz3.lat
upigula.store
81861a2.shop
aintpro.homes
at-removal-near-me-105.website
osmeticpacka12gingjob07.bond
lprodtern.biz
ox-bitcoin.vip
ykatytrailstation.online
200mhits.rest
zsj.bid
uakke-stage.tech
cjra.info
ccursed.world
nline-advertising-77388.bond
etsestimate.net
amilrockers.bio
utomation-tools-52229.bond
nline-advertising-26922.bond
Targets
-
-
Target
PP-200446-FDA.exe
-
Size
919KB
-
MD5
9be9423c9ffddaae3deeba862a7ddd07
-
SHA1
d7be54756136d3a7becbdace6d964de692a62e9a
-
SHA256
f0015592877dde5dfcd0da20d585c611c5b8c2ac9a66b794d4cdc882014f2b76
-
SHA512
a9daab4511d2208b3894a7709184aa3d3d89ec9c36f722d4958573f63c00b7e17270361078a8164b2a90ec1c72129b72dc2670721479434ae057addd0be06c0f
-
SSDEEP
12288:mHyDZHdP+eCSmbT4lwVBWVow4T7twjFl2w8fRMdVjbfdvYrGvwthL8GOvgetMUIk:PDFCt8lwrk4qhkwqRMvjbl8GotFa6QP
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-