General
-
Target
15edc7be3db63aea30a9401469c252f2ed6081e06243f73a9076d68fc58734ee
-
Size
599KB
-
Sample
250122-xb7nhazrdn
-
MD5
6df67a23756a0a6ce3a9b4ce23e377e8
-
SHA1
74c1eeb7c6cc49d078877698d723053ac52d3f24
-
SHA256
15edc7be3db63aea30a9401469c252f2ed6081e06243f73a9076d68fc58734ee
-
SHA512
b73e5c26601c25aee73aa63b0abb31736b04d95d5e94923b8632491d803639bcabccaa96ef8e00874784c24c4808bde07d9c69b8f0c5e517c069884abe7b869b
-
SSDEEP
12288:KhA6/3jNAmlHHEbKH8sSy9omVY9VquOd40TMdVL5TpTmX:KhF/3jWmcKH8scmqpO2h4X
Static task
static1
Behavioral task
behavioral1
Sample
Order Request.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
g10k
utomation-tools-91489.bond
nugandshimmer.store
agazalarburada.net
tockfrenzy.sbs
idrift.net
linds-curtains-49899.bond
armonysupport.net
issa.xyz
emza.xyz
animobilya.xyz
les.fun
uckaeth.vip
urusheasycart.shop
xploring6304.xyz
62288.pro
gencies.team
74411.vip
uxit.online
ailygrowth.xyz
errickmarconi.online
ruckbedorganizer.shop
rdc.xyz
estaurant-jobs-57415.bond
m5-b-a-l-l-o-o-n-s-yfk.rest
arenttraining.online
ilmyvibe.xyz
erialystartgoa.online
ifex.shop
hepiface.online
atellite-internet-56621.bond
nipolatotocc8.xyz
phugs.info
onchecker.online
vk2.lat
irth.cyou
awfood.info
oun2-winner.store
eelshort.xyz
rcm2.icu
enailearning.school
xquisitepets.shop
ingzupost.live
etter-design.shop
qrdkdq1136.vip
edeliverclean.services
nkfusion.xyz
ourisma.xyz
0726.pizza
oving-companies-55477.bond
oobam.shop
herrylight.net
easy.xyz
eauty-services-55271.bond
0061222.xyz
reeslice.net
anbetsu.info
osmeticpackagingjob0117.bond
ensentoto.cloud
ental-implants-57114.bond
nline-advertising-24997.bond
mindap.xyz
ag-seguroo.store
agmaster.xyz
oincommonwlth.xyz
wiftly.company
Targets
-
-
Target
Order Request.exe
-
Size
687KB
-
MD5
58c75c0c7af1046ac9db4f446765f213
-
SHA1
6409a5dcd59c36fde2cddec428f22286bd4dc3b0
-
SHA256
b0f1c4f3d4d3dda1a8c8ee81ecbde9a91fa3923058c13ac69dc572193252e0a2
-
SHA512
e557ae7f1e5d5fb8d5a1cda4b15de2873d1a49d99b41d2a9f5a2da1ab7511dcc6b512180e3dd1cebf42d042efd953edf32960e3ee29aa1957e227da8694a670d
-
SSDEEP
12288:AlLyWa+k0NoZzDHVZpPpEmRYlNqWQd62TMd5LfyuvGYec:Ok0WZfXkm8LQUbBN
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-