General
-
Target
sggii.exe
-
Size
844KB
-
Sample
241219-j8egbsxkdp
-
MD5
1a330ea2c1b274736cc9cd1ad4d58011
-
SHA1
d28bab9013ab8ae0549db9334744b29885c6f10b
-
SHA256
4672f0638e704fe1fcf9b905b3f87677f2158a24c6a924d6540101d181780b1e
-
SHA512
eb070e2e00b05e666d084bb89e1900d5caafbdfcdf97efbf21a1543b6bc9bd6015a5cc0d712bfa6372f69302f4add8063004883c2662679ac6b3f29abbb1b041
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QL1fUdW7Kn7yjL+Hr:ffmMv6Ckr7Mny5QL9nKn7yjEr
Static task
static1
Behavioral task
behavioral1
Sample
sggii.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
cl21
0001.shop
earch-parttimejobs.today
are888.top
akanhaunthipped.shop
othing-heyu.xyz
cadvirsor.net
nclanalae.shop
lectric-cars-mexico.today
oxj-question.xyz
ersonalloanoffers.today
ersonalloans-fo54-fo37.click
verybody-ewfx.xyz
ercuremontauban.media
azilimdunyam.net
airs-clinicato.today
wiftsscend.click
ertainly-jbws.xyz
8xeng.app
damekadmitageable.cfd
ollapsedec.shop
mpldo.app
g18q29a.top
etaddiction.tech
lbatasalboinamoco.shop
eyyzj-medical.xyz
ote-lmeg.xyz
cellelukacs.shop
evinedesignz11.net
n217.vip
eimy.top
ellisimaa.shop
hjk-west.xyz
nline-dating-be-10.today
wocykmw.top
ytsxv.xyz
iding-lawn-mower.today
olarpergolasolutions.today
ainco.net
r86yd.top
ndrvb-stock.xyz
ing88vn.today
vez3.xyz
fg-am.pro
ultplanlz.click
ecurebet.click
fjng-court.xyz
rsenalatamanaxweed.shop
iaoyingtao16.vip
rime-kvsff.xyz
ufdd-interesting.xyz
qbdl-base.xyz
ushihq.xyz
400108pptddbo685.top
tself-gqemlq.xyz
uyher.shop
ffprintshoplv.shop
ushyniceneobaza.cfd
dmrroa.net
ar-deals-ca-8966160.live
ramx-jorv.top
ifw-less.xyz
hwisdom.net
xrjgq-prepare.xyz
rchertravel.click
ingledatings46.xyz
Targets
-
-
Target
sggii.exe
-
Size
844KB
-
MD5
1a330ea2c1b274736cc9cd1ad4d58011
-
SHA1
d28bab9013ab8ae0549db9334744b29885c6f10b
-
SHA256
4672f0638e704fe1fcf9b905b3f87677f2158a24c6a924d6540101d181780b1e
-
SHA512
eb070e2e00b05e666d084bb89e1900d5caafbdfcdf97efbf21a1543b6bc9bd6015a5cc0d712bfa6372f69302f4add8063004883c2662679ac6b3f29abbb1b041
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QL1fUdW7Kn7yjL+Hr:ffmMv6Ckr7Mny5QL9nKn7yjEr
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-