General
-
Target
9109456918e7833784c58988098f87eb007e4038f516241972d4cc2450f43df3.exe
-
Size
833KB
-
Sample
250114-dd1hesxkfj
-
MD5
a6c41278ad08a6dc829a7f411fe47193
-
SHA1
10aebd0e7a6da6c6fe10b37a6b171d801b8b6924
-
SHA256
9109456918e7833784c58988098f87eb007e4038f516241972d4cc2450f43df3
-
SHA512
e2ca3ed8565c38cf472f1258bee03d1d1491ca315ea95c86a4af53754e198428d1caf908f3ba70dc39b6799e1d556e9500b248dd40c9f06bccc22da32d776a27
-
SSDEEP
24576:I8yNK1t4NK1tOqLBJ8IEFBlB5roINZQQ1yer:XhjYPlTomZ
Static task
static1
Behavioral task
behavioral1
Sample
9109456918e7833784c58988098f87eb007e4038f516241972d4cc2450f43df3.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
g10y
oofingpro.xyz
sertc.xyz
toaas.xyz
appysnacks.store
julio.tech
nfluencer-marketing-67952.bond
rginine888.store
haampion-slotss.bet
anicajet.xyz
lumber-jobs-91014.bond
eartsandco.store
ctualiza.icu
iso23.vip
udihebohofficial.boats
lackt.xyz
ymonejohnsonart.online
dereji.info
msqdhccc3.shop
auptstadttarif.online
overebyvibes.online
ollywoodbets.video
alaworld.info
etitoken.xyz
andapick.cloud
utomation-tools-52953.bond
lseefupufi.info
bandoned-houses-51755.bond
w90vy3m.xyz
eritejardin.online
hongston.art
hecondocoop.net
amster-gamedev.fun
dg159.xyz
bison.net
nline-gaming-50823.bond
se-online.net
enxin.icu
cst.net
holesale-897.shop
etgpt.info
et7k.baby
eothesis.online
hipmongtop.one
otostuenti.info
ignin.fun
telli.xyz
uralta.net
eem.shop
etclcg.business
ingavpost.live
inhard.net
ustomkitchencabinets.today
2vl673d.shop
39660.pro
sortagim.net
ysilentbattle.online
81tf464d.shop
obcome.xyz
tagers.xyz
aelo.xyz
nfluencer-marketing-45855.bond
eacoastcompany.sbs
oo.engineer
elax.xyz
eautylab.fun
Targets
-
-
Target
9109456918e7833784c58988098f87eb007e4038f516241972d4cc2450f43df3.exe
-
Size
833KB
-
MD5
a6c41278ad08a6dc829a7f411fe47193
-
SHA1
10aebd0e7a6da6c6fe10b37a6b171d801b8b6924
-
SHA256
9109456918e7833784c58988098f87eb007e4038f516241972d4cc2450f43df3
-
SHA512
e2ca3ed8565c38cf472f1258bee03d1d1491ca315ea95c86a4af53754e198428d1caf908f3ba70dc39b6799e1d556e9500b248dd40c9f06bccc22da32d776a27
-
SSDEEP
24576:I8yNK1t4NK1tOqLBJ8IEFBlB5roINZQQ1yer:XhjYPlTomZ
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-