General
-
Target
2af9584a5b0db854faf93cf0f215bebf8c6f463fa103d364a6def9c21621fa38
-
Size
631KB
-
Sample
250124-s9baqswjdt
-
MD5
f68f1a7e0a1fcc96125c92bed0c64c9f
-
SHA1
670360713e0690bd72c1c743869a0274ab42b9e0
-
SHA256
2af9584a5b0db854faf93cf0f215bebf8c6f463fa103d364a6def9c21621fa38
-
SHA512
4f2eafd5b980750b9bb01a74ae87d68e6a410bfd06017161a583cbd4ff6a78634eb50587eb23374bbb7fc7920a21e6fc0940d6d7a96e8fe9eb11d6c736983209
-
SSDEEP
12288:hoMhapkQwdtCyTl3a3e/HgpPARkKFfwG8RP3C/uT11bDsqhx6yTkRBX/eYK1jk:+M4pudtZa3ef/wG8VS/q1bDxYRBX1Uk
Static task
static1
Behavioral task
behavioral1
Sample
payment information.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
a01d
eniorshousing05.shop
rywisevas.biz
4726.pizza
itchen-design-42093.bond
3456.tech
4825.plus
nlinecraps.xyz
itamins-52836.bond
nfluencer-marketing-40442.bond
nline-advertising-58573.bond
rautogroups.net
limbtrip.net
oftware-download-14501.bond
nline-advertising-66733.bond
erity.xyz
xknrksi.icu
x-ist.club
yber-security-26409.bond
oincatch.xyz
onitoring-devices-34077.bond
hbvc.xyz
xecadminadvo.vip
ookers.homes
irlypods.shop
nalyzator.fun
rinciple.press
ejigghq.company
nity-officiels.shop
chtm.info
ggrupdanismanlik.online
alterjaviersemolic.online
6zc.lat
ukce.fun
ikretgunay.online
d8ns7gu.skin
06ks7.club
icovideo.voyage
nlinetutoringcanada776681.icu
etzero.icu
228080a0.buzz
agoslotoke.art
ruaim.online
nline-mba-87219.bond
oldsaver.biz
agonel.online
ommbank.video
indlab.shop
hesweettray.store
bilebe.info
uxemasculine.store
arkbarron.xyz
ektor.fun
8255.pizza
ike-loans-53803.bond
ong-ya.info
costcomembers-wholesale.online
75396.vip
leaning-services-53131.bond
uickcabinet.net
alifstorch.online
ahtel.net
usinessoverpleasure.shop
duway.pro
usiness-software-47704.bond
ustonehuman.info
Targets
-
-
Target
payment information.exe
-
Size
677KB
-
MD5
79b677627ca09f3e8e15bdad1040b11d
-
SHA1
bfb6d6fbdec73cc0715a21f40895ab442a279734
-
SHA256
8f41896e69d1f83408cf68e4d6fc56849a6ee6b86145e7cc68d6caed660ac582
-
SHA512
b5e6c0a66bcdd05bd53de3efd33b7c5f5faea5799de4f7aa8a31a68a9c872f27d6886807ef2e3ae9e7541804313d1c51efa66085d52e51e60fc6f62f23fe1a83
-
SSDEEP
12288:u4xLs4Eha1KQwdtcyTD3G3eVHCpPwRksFfwGsRPrC/uL11HDsqHx6YTkhBoM3:u4tE41Ydt9G3epfwGsV2/A1HdxchBoM
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-