General
-
Target
1e2391b8d34a3a4274b40103160d9cdbf5e421ac1113c4e1779733481d8f3d35
-
Size
573KB
-
Sample
250123-kner2asmbv
-
MD5
6388e0e282c034e01234f30acb3df5bf
-
SHA1
aa2d3939b7221003775b60b42ef3ba0c8101a51c
-
SHA256
1e2391b8d34a3a4274b40103160d9cdbf5e421ac1113c4e1779733481d8f3d35
-
SHA512
d47c2ce660345e683101ba24cf7e2dbb8f129ad0cbee22d1120f2179fa0193b3ca711384e61f9339fa3627346091234b443c08de9143d09e29c0c59177156a29
-
SSDEEP
12288:SQiKYHFTv8IiZIDEKfxuo/2xGRCDyOUF/GTsG+q5XX:ZOHFzKIBf4TGRCDyO0/8snkX
Static task
static1
Behavioral task
behavioral1
Sample
нова поръчка pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
g10y
oofingpro.xyz
sertc.xyz
toaas.xyz
appysnacks.store
julio.tech
nfluencer-marketing-67952.bond
rginine888.store
haampion-slotss.bet
anicajet.xyz
lumber-jobs-91014.bond
eartsandco.store
ctualiza.icu
iso23.vip
udihebohofficial.boats
lackt.xyz
ymonejohnsonart.online
dereji.info
msqdhccc3.shop
auptstadttarif.online
overebyvibes.online
ollywoodbets.video
alaworld.info
etitoken.xyz
andapick.cloud
utomation-tools-52953.bond
lseefupufi.info
bandoned-houses-51755.bond
w90vy3m.xyz
eritejardin.online
hongston.art
hecondocoop.net
amster-gamedev.fun
dg159.xyz
bison.net
nline-gaming-50823.bond
se-online.net
enxin.icu
cst.net
holesale-897.shop
etgpt.info
et7k.baby
eothesis.online
hipmongtop.one
otostuenti.info
ignin.fun
telli.xyz
uralta.net
eem.shop
etclcg.business
ingavpost.live
inhard.net
ustomkitchencabinets.today
2vl673d.shop
39660.pro
sortagim.net
ysilentbattle.online
81tf464d.shop
obcome.xyz
tagers.xyz
aelo.xyz
nfluencer-marketing-45855.bond
eacoastcompany.sbs
oo.engineer
elax.xyz
eautylab.fun
Targets
-
-
Target
нова поръчка pdf.exe
-
Size
689KB
-
MD5
543fb196348fc3dc47731e7480b55476
-
SHA1
2bce42c91d767bef6cb05f511c54e73e5d06dff9
-
SHA256
06d1d5e5a8e641a62df3b3282dc437d24d48a31cc60f691c760023429788ec6c
-
SHA512
1deed8d33159c1fd02534de98a6411fa9c129b4aea1d941d1e8dae002f48edcaed73ce38c49598e9997097ffd828d02a53661a19b4e6530198de62bd28296748
-
SSDEEP
12288:RiFtTLMIhPTv0IWZIf+KLlukv4XA7mDiO6FFIGnWq:RWTbhPzaIZLMxA7mDiOKQ
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-