General
-
Target
nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta
-
Size
14KB
-
Sample
250204-ga8w6sxkf1
-
MD5
24a0a0feeb3c8ddf4e0a8480107d5a47
-
SHA1
826364c4e1b951b3cb5d0c5d82db4a8e59e05140
-
SHA256
56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b
-
SHA512
2c318b518bf94a264dfc6ae8938a00b7f915a38f7105b4c7df7799fd242b9906e4147644f26b5f2ecdcf892f5186efcd9c5182ef1e8f155b460a24d7ba5cac3e
-
SSDEEP
48:3aodOOQvMUUdOOQHnMUvMxyhz+rntkpyr+slA6Y8TurdkGijmQdkrC3dOOQe0dO1:qoOMhQM1AhmtscdlRB/arEY/PMfW+
Static task
static1
Behavioral task
behavioral1
Sample
nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
b101
ent-apartments-2801.click
lsyw.top
eccurastock.online
j958.net
eepelement.tech
rueblueimpact.shop
etechhome.net
ianchui.cfd
mall-business-22321.bond
tatewidefinancialservices.net
orbitmac.info
ovehkjepe88.club
zzhmamn.xyz
uslimbooking.net
uto253.pro
ortalexpresscliepr.lat
tikk.shop
iaoniang.cfd
sdg-6603.cyou
myd.net
motionen-es.online
dnrkdek.xyz
areo.care
tockcoin.online
ilvaguard.info
estserverhost.net
ndda.tokyo
atieowen.art
eviewedapproved.net
nujstore.online
-incad-id017.top
eat-pumps-40508.bond
ngjbmfi.xyz
pepeb.xyz
eancaba.net
hmadfawad.realtor
ratinacaite.top
etcal.shop
hostassets.sucks
gsn.xyz
345.top
rkzqzxp.xyz
azablog.online
klerip.xyz
mjoh.info
69.fyi
ashqhshhq-hqaishahsq.cyou
obri.online
k7nsfyf.top
ulebuy.website
al5.xyz
nsac-atendimentos.online
linko-win.art
eroplane.bet
ahilamoney.world
ires-70107.bond
8zhuan357.yachts
ometa-casino-hzu.top
kdigitaltouchclass.online
ildiztek.xyz
andar-jaya4d.info
ayna.website
in-up-casino-nvq8.top
eepseek-ai-assistant.online
3rdwi.click
Targets
-
-
Target
nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta
-
Size
14KB
-
MD5
24a0a0feeb3c8ddf4e0a8480107d5a47
-
SHA1
826364c4e1b951b3cb5d0c5d82db4a8e59e05140
-
SHA256
56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b
-
SHA512
2c318b518bf94a264dfc6ae8938a00b7f915a38f7105b4c7df7799fd242b9906e4147644f26b5f2ecdcf892f5186efcd9c5182ef1e8f155b460a24d7ba5cac3e
-
SSDEEP
48:3aodOOQvMUUdOOQHnMUvMxyhz+rntkpyr+slA6Y8TurdkGijmQdkrC3dOOQe0dO1:qoOMhQM1AhmtscdlRB/arEY/PMfW+
-
Formbook family
-
Formbook payload
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-