General
-
Target
e4ec8ac5acae00db2b97ac230b4fca234066f0e58f1c3cf08e8b079ea7701b46
-
Size
1.2MB
-
Sample
250114-z7hqcszqcx
-
MD5
05222dbbdceb4922e6595572589d1d97
-
SHA1
db8ddf9a30d3487fe17b7cb416fdd6ca9db6e606
-
SHA256
e4ec8ac5acae00db2b97ac230b4fca234066f0e58f1c3cf08e8b079ea7701b46
-
SHA512
3104c1e92aefd4ea0ee7f7426e268b4a52f221ad0587507c47ec653a5038801c162796480f098175bcc81a2a7a12a26ff1914aa64e1f76342495748021b13008
-
SSDEEP
24576:j5Wt2EYaA1SI4ps+o4+G4KwZK5j8zqjD0JZ4EJ9Wv8iSYvsIDAWzADu:9tExA1SFt3pj8zqf0J2EfWv5SUZAq
Static task
static1
Behavioral task
behavioral1
Sample
e4ec8ac5acae00db2b97ac230b4fca234066f0e58f1c3cf08e8b079ea7701b46.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4ec8ac5acae00db2b97ac230b4fca234066f0e58f1c3cf08e8b079ea7701b46.xlsx
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
4.1
mtpi
noriel.top
fast-profit.xyz
octominer.shop
perm-donor-unitedkingdom.today
techtalks.live
car-deals-83345.bond
aviso-pontos.net
luxmarty.online
signes.info
coinshift.finance
lanangkia.fun
outdoorpatioumbrellastore.shop
kvasilkov.dev
aviatorgamesplay.xyz
seeasalstcornwalls.shop
erdekescortg.xyz
binhminhhoamaiaqst.site
sumeyramodam.xyz
42825.club
agriroccella.com
sisiwerbaa1.online
bao-showbiz.info
2403dmc07.top
buycott.live
bd1ry22n.xyz
mavilleconnectee.motorcycles
81582.ooo
smarminds.xyz
belivsh.top
rty5621.xyz
samudrabet-merdeka4.asia
d26htg.vip
tybcq.rest
ductlessconditionsilt.bond
polistudyour.top
u888z.info
megasensa88.pro
envisionsuccess.info
freelancetravel.asia
ev5px.cyou
theshop.build
allinathletes.pro
kylanyaboke.tech
x63jv178ot.bond
business-software-13225.bond
product-tester-jobs-95135.bond
ra-postk.top
yftrfw34.cfd
789btrangchu.buzz
zfbjr.top
izza-tools.shop
lgdiamonds.kaufen
runlikezombie.icu
goldent.day
fitflopshop.club
online-advertising-11374.bond
chouse.cyou
digitaladvertising.buzz
icymelts.direct
serherseershjrre.buzz
22324002.xyz
dommalapati.shop
excavators-69165.bond
runchat.app
canadaspostn-postecanadasd.top
Targets
-
-
Target
e4ec8ac5acae00db2b97ac230b4fca234066f0e58f1c3cf08e8b079ea7701b46
-
Size
1.2MB
-
MD5
05222dbbdceb4922e6595572589d1d97
-
SHA1
db8ddf9a30d3487fe17b7cb416fdd6ca9db6e606
-
SHA256
e4ec8ac5acae00db2b97ac230b4fca234066f0e58f1c3cf08e8b079ea7701b46
-
SHA512
3104c1e92aefd4ea0ee7f7426e268b4a52f221ad0587507c47ec653a5038801c162796480f098175bcc81a2a7a12a26ff1914aa64e1f76342495748021b13008
-
SSDEEP
24576:j5Wt2EYaA1SI4ps+o4+G4KwZK5j8zqjD0JZ4EJ9Wv8iSYvsIDAWzADu:9tExA1SFt3pj8zqf0J2EfWv5SUZAq
-
Formbook family
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-