General
-
Target
210c8c40bffff97e6fc7fc670e3a08d67c55307ec73295eff3d2c8b88983a02f
-
Size
681KB
-
Sample
250204-hwee5ayrhv
-
MD5
f3c65d21c85f13bd02bd9ccde0fe7204
-
SHA1
f6cccacd078dc1ba74271fe901b6755fe6bbc3a0
-
SHA256
210c8c40bffff97e6fc7fc670e3a08d67c55307ec73295eff3d2c8b88983a02f
-
SHA512
8e496e7c853f247e48e4f9fac912c9a2738a178d201cbbe4340464fa84be7801d6b7cd6172f6c1fc47db6b1e134ea1cb9742f3b92e80846b069986e74845dea3
-
SSDEEP
12288:JYSGuxswecl9UWCUnRAD4vksa3nnZSNz/MZ9b8qEE71el9EihGj3NykXnxzA:UwegCUGD4csUZYz0Z9dh5icj34ux
Static task
static1
Behavioral task
behavioral1
Sample
210c8c40bffff97e6fc7fc670e3a08d67c55307ec73295eff3d2c8b88983a02f.exe
Resource
win7-20241023-en
Malware Config
Extracted
formbook
4.1
kmge
i54ly657ur.autos
stove-10000.bond
furkanenes.live
foziaclothing.shop
peron.app
landscaping-services-88568.bond
home-remodeling-96005.bond
offersnow-store.shop
apsida.tech
ux-design-courses-90368.bond
nb-event-b2b.online
2tdb3dk65m.skin
juniper.fit
eurosirel.info
web-cfe.one
a48268104.top
darkoxygen.info
beautysideup.shop
solar-battery-34557.bond
dib57.top
apihoki.live
cinholiao3.click
binxbress-bd-w8-em.shop
car-loans-78152.bond
cypher.casino
go88l.club
youyou0612.cfd
car-deals-93792.bond
ft0722a9usj38.shop
zxxzaanm.top
getc.pro
son37.club
bakingcourse01.today
refpalhsdx.top
sweethome4.buzz
yaqpqljcwmhesaj.buzz
gsolartech.com
nw0qbr.top
sakanatei.net
home-care-access-new-promo.bond
llama3-2video.net
douromaintenance.info
joycasino-hem.top
cg-qu.xyz
bogotienda.online
010jcgk.com
solar-systems-panels-50320.bond
cosmetics-30710.bond
pgfnrecuperacao.store
imples.live
bnckdaae.top
silviarusina.shop
krainedating.info
maskverifyemail.online
ttrading.pro
trendy-style.store
miranda-j.online
030003741.xyz
hoteldanibaan.info
zunica.shop
ftth.monster
c87xy374jt.bond
yhy05.cfd
blueoceanfilm.institute
lapostehotel.one
Targets
-
-
Target
210c8c40bffff97e6fc7fc670e3a08d67c55307ec73295eff3d2c8b88983a02f
-
Size
681KB
-
MD5
f3c65d21c85f13bd02bd9ccde0fe7204
-
SHA1
f6cccacd078dc1ba74271fe901b6755fe6bbc3a0
-
SHA256
210c8c40bffff97e6fc7fc670e3a08d67c55307ec73295eff3d2c8b88983a02f
-
SHA512
8e496e7c853f247e48e4f9fac912c9a2738a178d201cbbe4340464fa84be7801d6b7cd6172f6c1fc47db6b1e134ea1cb9742f3b92e80846b069986e74845dea3
-
SSDEEP
12288:JYSGuxswecl9UWCUnRAD4vksa3nnZSNz/MZ9b8qEE71el9EihGj3NykXnxzA:UwegCUGD4csUZYz0Z9dh5icj34ux
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-