General
-
Target
2b73e14598fa9527a5d3b18e34a2b263a4001785a862932005caad64025c86a3.xz
-
Size
564KB
-
Sample
250130-dherhsvrgm
-
MD5
4a77488f77ff4cd08acec0265f6db180
-
SHA1
e64925046e44599f4b1a65741a06610b89e36500
-
SHA256
2b73e14598fa9527a5d3b18e34a2b263a4001785a862932005caad64025c86a3
-
SHA512
4357f57dd6a3bdaa90f3988ae23ebc041453169f090bf9f48698c8d0d68dc740d8b792757031be560d1358def0d1ba165a17c5a52d39f416a08f55a937d8f593
-
SSDEEP
12288:WM2u8Hi1cqYuh4zUILeOO0B8Tz88RPyMaqAxfCWVd/KFBh:W+8mWV/WTzB4PQWeFBh
Static task
static1
Behavioral task
behavioral1
Sample
2b73e14598fa9527a5d3b18e34a2b263a4001785a862932005caad64025c86a3.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
kmge
i54ly657ur.autos
stove-10000.bond
furkanenes.live
foziaclothing.shop
peron.app
landscaping-services-88568.bond
home-remodeling-96005.bond
offersnow-store.shop
apsida.tech
ux-design-courses-90368.bond
nb-event-b2b.online
2tdb3dk65m.skin
juniper.fit
eurosirel.info
web-cfe.one
a48268104.top
darkoxygen.info
beautysideup.shop
solar-battery-34557.bond
dib57.top
apihoki.live
cinholiao3.click
binxbress-bd-w8-em.shop
car-loans-78152.bond
cypher.casino
go88l.club
youyou0612.cfd
car-deals-93792.bond
ft0722a9usj38.shop
zxxzaanm.top
getc.pro
son37.club
bakingcourse01.today
refpalhsdx.top
sweethome4.buzz
yaqpqljcwmhesaj.buzz
gsolartech.com
nw0qbr.top
sakanatei.net
home-care-access-new-promo.bond
llama3-2video.net
douromaintenance.info
joycasino-hem.top
cg-qu.xyz
bogotienda.online
010jcgk.com
solar-systems-panels-50320.bond
cosmetics-30710.bond
pgfnrecuperacao.store
imples.live
bnckdaae.top
silviarusina.shop
krainedating.info
maskverifyemail.online
ttrading.pro
trendy-style.store
miranda-j.online
030003741.xyz
hoteldanibaan.info
zunica.shop
ftth.monster
c87xy374jt.bond
yhy05.cfd
blueoceanfilm.institute
lapostehotel.one
Targets
-
-
Target
2b73e14598fa9527a5d3b18e34a2b263a4001785a862932005caad64025c86a3
-
Size
669KB
-
MD5
ad90b7ef4c9611dc1ba60fccef729b3a
-
SHA1
5e6f73d1e88a5e7ed7283ba195ed158849ae9cad
-
SHA256
bf6ce08a4c3bb3395310e980d52c5cddfd7d30924e2c1b1b1451790421ac6d6e
-
SHA512
900ff1695d83e832a9f6d0d7b5f1f0d2240bc0c8da0d570494d79f9506de794bee67dcf40ed9b20e112f295e03251c2c06df62d9bfdc9cb99200cfa586699b1b
-
SSDEEP
12288:dKjNZYuhezUIseO40B8Tn8TRPyca/AxfuWVd/KFBSNUehNLn:+1HVNWTnoGYwWeFBSNUeDLn
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-