General
-
Target
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46
-
Size
736KB
-
Sample
250124-e4av5a1ldq
-
MD5
a38bf0cb849b74859811215bf7b38129
-
SHA1
8c74dd2e056a8f1d0d3051c3815ef8a5ff213e83
-
SHA256
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46
-
SHA512
46a44e51f67ca609c814e43ff304eabacb1de5f86347656871026185e2c971abce9496bfa6fb0aba176bc7b17eb3ff20c76411f6911894de3edaadf44145e115
-
SSDEEP
12288:sKOlbxrk0IO8DfSbK9OMiKkh5Ur02lGnhp5VtERFL6cnmGsOBWahIvuI0zNLn:1/fZoMiKkor0Fhdt2XnmfKWaGvdgLn
Static task
static1
Behavioral task
behavioral1
Sample
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
egs9
alliancecigars.net
35893.pizza
selidik.cloud
evel789-aman.club
wqsbr5jc.vip
corretoraplanodesaude.shop
balikoltada.xyz
play-vanguard-nirvana.xyz
paktuaslotxcxrtp.xyz
retailzone1997.shop
jk77juta-official.cloud
godmoments.app
flippinforbidsfrear.cloud
234bets.net
cryptobiz.tech
construction-jobs-50157.bond
cuficdarbiesdarleen.cloud
t59bm675ri.skin
ondqwxl.top
kpde.xyz
apoiador.xyz
denotational.xyz
fat-removal-40622.bond
kqsamcsauqiagmma.xyz
online-advertising-68283.bond
mise96.xyz
pokerdom55.vip
arai.rest
marketplace20.click
kongou.systems
isbnu.shop
online-advertising-98154.bond
pepsico.llc
80072661.xyz
wholesalemeat.today
security-apps-16796.bond
remationservices26114.shop
kitchen-remodeling-14279.bond
betterskin.store
aigamestudio.xyz
uhsrgi.info
mentagekript.today
box-spring-bed-50031.bond
blood-flow.bond
653emd.top
venturelinks.net
trendysolutions.store
creativege.xyz
sellhome.live
petir99bro.xyz
maipingxiu.net
influencer-marketing-56510.bond
czlovesys.xyz
phpcrazy.net
hikingk.store
imstest.online
bet2024.shop
lord.land
gobg.net
armada77x.sbs
msytuv.info
buenosbufidinburez.cloud
transeo.xyz
deltaestates.online
redgoodsgather.shop
Targets
-
-
Target
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46
-
Size
736KB
-
MD5
a38bf0cb849b74859811215bf7b38129
-
SHA1
8c74dd2e056a8f1d0d3051c3815ef8a5ff213e83
-
SHA256
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46
-
SHA512
46a44e51f67ca609c814e43ff304eabacb1de5f86347656871026185e2c971abce9496bfa6fb0aba176bc7b17eb3ff20c76411f6911894de3edaadf44145e115
-
SSDEEP
12288:sKOlbxrk0IO8DfSbK9OMiKkh5Ur02lGnhp5VtERFL6cnmGsOBWahIvuI0zNLn:1/fZoMiKkor0Fhdt2XnmfKWaGvdgLn
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-