General
-
Target
attached PO.exe
-
Size
687KB
-
Sample
250122-qy359symgw
-
MD5
58c75c0c7af1046ac9db4f446765f213
-
SHA1
6409a5dcd59c36fde2cddec428f22286bd4dc3b0
-
SHA256
b0f1c4f3d4d3dda1a8c8ee81ecbde9a91fa3923058c13ac69dc572193252e0a2
-
SHA512
e557ae7f1e5d5fb8d5a1cda4b15de2873d1a49d99b41d2a9f5a2da1ab7511dcc6b512180e3dd1cebf42d042efd953edf32960e3ee29aa1957e227da8694a670d
-
SSDEEP
12288:AlLyWa+k0NoZzDHVZpPpEmRYlNqWQd62TMd5LfyuvGYec:Ok0WZfXkm8LQUbBN
Static task
static1
Behavioral task
behavioral1
Sample
attached PO.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
g10k
utomation-tools-91489.bond
nugandshimmer.store
agazalarburada.net
tockfrenzy.sbs
idrift.net
linds-curtains-49899.bond
armonysupport.net
issa.xyz
emza.xyz
animobilya.xyz
les.fun
uckaeth.vip
urusheasycart.shop
xploring6304.xyz
62288.pro
gencies.team
74411.vip
uxit.online
ailygrowth.xyz
errickmarconi.online
ruckbedorganizer.shop
rdc.xyz
estaurant-jobs-57415.bond
m5-b-a-l-l-o-o-n-s-yfk.rest
arenttraining.online
ilmyvibe.xyz
erialystartgoa.online
ifex.shop
hepiface.online
atellite-internet-56621.bond
nipolatotocc8.xyz
phugs.info
onchecker.online
vk2.lat
irth.cyou
awfood.info
oun2-winner.store
eelshort.xyz
rcm2.icu
enailearning.school
xquisitepets.shop
ingzupost.live
etter-design.shop
qrdkdq1136.vip
edeliverclean.services
nkfusion.xyz
ourisma.xyz
0726.pizza
oving-companies-55477.bond
oobam.shop
herrylight.net
easy.xyz
eauty-services-55271.bond
0061222.xyz
reeslice.net
anbetsu.info
osmeticpackagingjob0117.bond
ensentoto.cloud
ental-implants-57114.bond
nline-advertising-24997.bond
mindap.xyz
ag-seguroo.store
agmaster.xyz
oincommonwlth.xyz
wiftly.company
Targets
-
-
Target
attached PO.exe
-
Size
687KB
-
MD5
58c75c0c7af1046ac9db4f446765f213
-
SHA1
6409a5dcd59c36fde2cddec428f22286bd4dc3b0
-
SHA256
b0f1c4f3d4d3dda1a8c8ee81ecbde9a91fa3923058c13ac69dc572193252e0a2
-
SHA512
e557ae7f1e5d5fb8d5a1cda4b15de2873d1a49d99b41d2a9f5a2da1ab7511dcc6b512180e3dd1cebf42d042efd953edf32960e3ee29aa1957e227da8694a670d
-
SSDEEP
12288:AlLyWa+k0NoZzDHVZpPpEmRYlNqWQd62TMd5LfyuvGYec:Ok0WZfXkm8LQUbBN
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-