General
-
Target
49db0f5a8084b3bd660a46be3b33f497772c57cbaad095df927b7d07b73c8ffe
-
Size
602KB
-
Sample
250203-hv6szswmak
-
MD5
507068aa07571b73ac4bad854d8774c3
-
SHA1
2aa361a677cbc9adb21ce131fb7bd5b4684d158e
-
SHA256
49db0f5a8084b3bd660a46be3b33f497772c57cbaad095df927b7d07b73c8ffe
-
SHA512
8e5b3f059ab3f6c466fae3ac0ec6c6c649d931df8b4708cfa05d4cb426acef838586b900325b0605032acc124aaac92277d0150887730c9f1d6b7fdb16069014
-
SSDEEP
12288:a6yeJOrlZ0JWthYD9U5QpPiPWqSahXXnpUpQQhKlP9PBbob4rRohBqGrDA:T40ULIiPhSaEpQQKlP9PBk4ruhBq0DA
Static task
static1
Behavioral task
behavioral1
Sample
payment confirmation.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
a01d
eniorshousing05.shop
rywisevas.biz
4726.pizza
itchen-design-42093.bond
3456.tech
4825.plus
nlinecraps.xyz
itamins-52836.bond
nfluencer-marketing-40442.bond
nline-advertising-58573.bond
rautogroups.net
limbtrip.net
oftware-download-14501.bond
nline-advertising-66733.bond
erity.xyz
xknrksi.icu
x-ist.club
yber-security-26409.bond
oincatch.xyz
onitoring-devices-34077.bond
hbvc.xyz
xecadminadvo.vip
ookers.homes
irlypods.shop
nalyzator.fun
rinciple.press
ejigghq.company
nity-officiels.shop
chtm.info
ggrupdanismanlik.online
alterjaviersemolic.online
6zc.lat
ukce.fun
ikretgunay.online
d8ns7gu.skin
06ks7.club
icovideo.voyage
nlinetutoringcanada776681.icu
etzero.icu
228080a0.buzz
agoslotoke.art
ruaim.online
nline-mba-87219.bond
oldsaver.biz
agonel.online
ommbank.video
indlab.shop
hesweettray.store
bilebe.info
uxemasculine.store
arkbarron.xyz
ektor.fun
8255.pizza
ike-loans-53803.bond
ong-ya.info
costcomembers-wholesale.online
75396.vip
leaning-services-53131.bond
uickcabinet.net
alifstorch.online
ahtel.net
usinessoverpleasure.shop
duway.pro
usiness-software-47704.bond
ustonehuman.info
Targets
-
-
Target
payment confirmation.exe
-
Size
680KB
-
MD5
670ec4d161f3b49adb0b58058bed084b
-
SHA1
5e889f32779fc120704288450fae1bd1dfbd0926
-
SHA256
637ec5277677d323a35dce85ac7fb3440ec70ca14fbaa051a2df46652a4711d4
-
SHA512
a23a569972d95ad0405e3e83a7200eb463abd88ee669ac76a85621e513148979de8e4965cad4cda90bdbe35ff31377e7d579581237f670f73fa008b4b8db9965
-
SSDEEP
12288:iYnwXaswecl9h8UtmmU2kNntDA7ITIMN8rQnNfkGSdhXZXi6yiah:GweRWmR2IDA7Jo8rQnizdj
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-