General
-
Target
нова поръчка pdf.exe
-
Size
689KB
-
Sample
250123-jqy31s1pbj
-
MD5
543fb196348fc3dc47731e7480b55476
-
SHA1
2bce42c91d767bef6cb05f511c54e73e5d06dff9
-
SHA256
06d1d5e5a8e641a62df3b3282dc437d24d48a31cc60f691c760023429788ec6c
-
SHA512
1deed8d33159c1fd02534de98a6411fa9c129b4aea1d941d1e8dae002f48edcaed73ce38c49598e9997097ffd828d02a53661a19b4e6530198de62bd28296748
-
SSDEEP
12288:RiFtTLMIhPTv0IWZIf+KLlukv4XA7mDiO6FFIGnWq:RWTbhPzaIZLMxA7mDiOKQ
Static task
static1
Behavioral task
behavioral1
Sample
нова поръчка pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
g10y
oofingpro.xyz
sertc.xyz
toaas.xyz
appysnacks.store
julio.tech
nfluencer-marketing-67952.bond
rginine888.store
haampion-slotss.bet
anicajet.xyz
lumber-jobs-91014.bond
eartsandco.store
ctualiza.icu
iso23.vip
udihebohofficial.boats
lackt.xyz
ymonejohnsonart.online
dereji.info
msqdhccc3.shop
auptstadttarif.online
overebyvibes.online
ollywoodbets.video
alaworld.info
etitoken.xyz
andapick.cloud
utomation-tools-52953.bond
lseefupufi.info
bandoned-houses-51755.bond
w90vy3m.xyz
eritejardin.online
hongston.art
hecondocoop.net
amster-gamedev.fun
dg159.xyz
bison.net
nline-gaming-50823.bond
se-online.net
enxin.icu
cst.net
holesale-897.shop
etgpt.info
et7k.baby
eothesis.online
hipmongtop.one
otostuenti.info
ignin.fun
telli.xyz
uralta.net
eem.shop
etclcg.business
ingavpost.live
inhard.net
ustomkitchencabinets.today
2vl673d.shop
39660.pro
sortagim.net
ysilentbattle.online
81tf464d.shop
obcome.xyz
tagers.xyz
aelo.xyz
nfluencer-marketing-45855.bond
eacoastcompany.sbs
oo.engineer
elax.xyz
eautylab.fun
Targets
-
-
Target
нова поръчка pdf.exe
-
Size
689KB
-
MD5
543fb196348fc3dc47731e7480b55476
-
SHA1
2bce42c91d767bef6cb05f511c54e73e5d06dff9
-
SHA256
06d1d5e5a8e641a62df3b3282dc437d24d48a31cc60f691c760023429788ec6c
-
SHA512
1deed8d33159c1fd02534de98a6411fa9c129b4aea1d941d1e8dae002f48edcaed73ce38c49598e9997097ffd828d02a53661a19b4e6530198de62bd28296748
-
SSDEEP
12288:RiFtTLMIhPTv0IWZIf+KLlukv4XA7mDiO6FFIGnWq:RWTbhPzaIZLMxA7mDiOKQ
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-