General
-
Target
03122024_1035_PP-200446-FDA.rar
-
Size
637KB
-
Sample
241203-mmpa7axjgq
-
MD5
5e6121af7f522d1475deb5711f029eb8
-
SHA1
c36b78e710f7889cf166987933c09905d877b02b
-
SHA256
5a39f01210773e6e5ff49ed4441d95130be57b363fd951e1eb5733d46db4b92e
-
SHA512
d40a4d6e0f9e8c939ee156f39326a33a3402dacb8248a1abed5c7e6c0cadbf6620294af402fe8da27c9383ebb182c7955e4f6f212beb8c53374a6f5b5e99b472
-
SSDEEP
12288:lebufMKIEtr7XZcZGV2SnxtJl43c/HH4jm01oeBeVVhe74h9R1eTrJ:0bCMKIi7XZ2KxtJlFH4i0qeBebQuheTN
Static task
static1
Behavioral task
behavioral1
Sample
PP-200446-FDA.exe
Resource
win7-20241023-en
Malware Config
Extracted
formbook
4.1
py25
ezani.fun
rsteknik.online
200mzeus.digital
5497.one
ragonflyers.biz
rome.photos
2142.vip
ise-en-mots.net
tickmangifts.store
thostransporteselogistica.shop
utomation-tools-36376.bond
okyo-tax-expert-459376580.today
azettellm.school
aafarzaneh-emer6.rest
aakoub-mc.xyz
linko-es-playmarket.store
ohr.xyz
ejic.online
iwagarden.net
ealip.net
ixsgah.info
arehouse-services-45615.bond
f6zh79i92.icu
kjhtr.xyz
7bet.rest
lazinglayer.net
eeef.asia
emsys.xyz
andscaping-jobs-41537.bond
uykishore.tech
7192024.xyz
alentmatters.xyz
oftware-download-34135.bond
evimli.biz
vfyvjt.buzz
utomation-tools-19980.bond
spnews.online
enang123play.xyz
laygroundequipment1.online
rginine-09.store
ata-protection-86943.bond
oews.xyz
martlink-snap.pro
26a689p.xyz
etfi.xyz
luckyourmeal.store
zz3.lat
upigula.store
81861a2.shop
aintpro.homes
at-removal-near-me-105.website
osmeticpacka12gingjob07.bond
lprodtern.biz
ox-bitcoin.vip
ykatytrailstation.online
200mhits.rest
zsj.bid
uakke-stage.tech
cjra.info
ccursed.world
nline-advertising-77388.bond
etsestimate.net
amilrockers.bio
utomation-tools-52229.bond
nline-advertising-26922.bond
Targets
-
-
Target
PP-200446-FDA.exe
-
Size
848KB
-
MD5
f54a313e117d804ec248e65fd4f49e6b
-
SHA1
f3c54d68796730257bc7b9c29b28483ad301a71e
-
SHA256
370d1eff1cc2c669efd391ac0a1bd6134cdf7dd250bf667c78cfc7447f7ed168
-
SHA512
8050a6efdcc08d8bb272927d82d5fb23577be176052e54492ac735c02282985af927501c5fca10dcb4af9fb17fd3799f31d8493959edc2f4207e37d33eb4997a
-
SSDEEP
12288:PZdsIR4R52J+XtvQKHqYgL3WHLEmv7YK+uVjt6Px1bDsoQtuE6ZS7pLFEE2PS6go:PZdsIeeZKHoGHLEmvwywPxctJhFacI7
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-