General
-
Target
ac59fca59ca403a16af2066aef8c4e0df4ef0193e8c4b8fe153144384d00be2d
-
Size
679KB
-
Sample
250203-ms56ws1jgp
-
MD5
ade005f0c8b870988e8958645ebfbfc4
-
SHA1
57e863cca6d9218b002811be571bc46388d99235
-
SHA256
ac59fca59ca403a16af2066aef8c4e0df4ef0193e8c4b8fe153144384d00be2d
-
SHA512
564955aaf52fea80788c491a396cab6f0e34cc67dbe35e9ba2c71af26eda6e2c88e3eb16ecc1e7ae86ef686048972eacd31761985cd42b06d2bb72d49568fbc0
-
SSDEEP
12288:sYxiDmswecl9kaxe6YCS7soBnvRYhmlmgvzPMpIbnL9fo6KRJNLYgja4KKR:+weMcqoBnvRimhPkE+Vfja4
Static task
static1
Behavioral task
behavioral1
Sample
ac59fca59ca403a16af2066aef8c4e0df4ef0193e8c4b8fe153144384d00be2d.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
g10y
oofingpro.xyz
sertc.xyz
toaas.xyz
appysnacks.store
julio.tech
nfluencer-marketing-67952.bond
rginine888.store
haampion-slotss.bet
anicajet.xyz
lumber-jobs-91014.bond
eartsandco.store
ctualiza.icu
iso23.vip
udihebohofficial.boats
lackt.xyz
ymonejohnsonart.online
dereji.info
msqdhccc3.shop
auptstadttarif.online
overebyvibes.online
ollywoodbets.video
alaworld.info
etitoken.xyz
andapick.cloud
utomation-tools-52953.bond
lseefupufi.info
bandoned-houses-51755.bond
w90vy3m.xyz
eritejardin.online
hongston.art
hecondocoop.net
amster-gamedev.fun
dg159.xyz
bison.net
nline-gaming-50823.bond
se-online.net
enxin.icu
cst.net
holesale-897.shop
etgpt.info
et7k.baby
eothesis.online
hipmongtop.one
otostuenti.info
ignin.fun
telli.xyz
uralta.net
eem.shop
etclcg.business
ingavpost.live
inhard.net
ustomkitchencabinets.today
2vl673d.shop
39660.pro
sortagim.net
ysilentbattle.online
81tf464d.shop
obcome.xyz
tagers.xyz
aelo.xyz
nfluencer-marketing-45855.bond
eacoastcompany.sbs
oo.engineer
elax.xyz
eautylab.fun
Targets
-
-
Target
ac59fca59ca403a16af2066aef8c4e0df4ef0193e8c4b8fe153144384d00be2d
-
Size
679KB
-
MD5
ade005f0c8b870988e8958645ebfbfc4
-
SHA1
57e863cca6d9218b002811be571bc46388d99235
-
SHA256
ac59fca59ca403a16af2066aef8c4e0df4ef0193e8c4b8fe153144384d00be2d
-
SHA512
564955aaf52fea80788c491a396cab6f0e34cc67dbe35e9ba2c71af26eda6e2c88e3eb16ecc1e7ae86ef686048972eacd31761985cd42b06d2bb72d49568fbc0
-
SSDEEP
12288:sYxiDmswecl9kaxe6YCS7soBnvRYhmlmgvzPMpIbnL9fo6KRJNLYgja4KKR:+weMcqoBnvRimhPkE+Vfja4
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-