General
-
Target
741addd2850aa3852e18c3571cb3bbbe198535acbe9ee9a03a6bbc2848e1e924
-
Size
639KB
-
Sample
250204-nwk6kawrgn
-
MD5
ca2e558713fcd0c4eab8fd704e449e52
-
SHA1
048c7fd223fb5484097d8783c66dfa2b91beafab
-
SHA256
741addd2850aa3852e18c3571cb3bbbe198535acbe9ee9a03a6bbc2848e1e924
-
SHA512
a3b52e4d6dca017bad4fd5cb269ba2f4af720e8eaac9268921ccefa19d4e9aba11d6b7ffb303aa68c539da8432b0294959877d762f3b8ddf1d672426cb243dca
-
SSDEEP
12288:QC7ZYLt7qcIJ5BKMOFwV/G9RMH0BBbLaRH/iGsIcb8ebojFwuYNO:QC7At+hLOFS/POaAGshTojGuYNO
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT pdf.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
o10c
regnancy-67873.bond
oppyworld.fun
oomoo.store
illyjolly.online
-avi.art
unisitri.net
unaid-jamshed.shop
ookcovers.xyz
estrated.xyz
rpa.club
4rcraft.online
litz.baby
lysiannails.art
commerce-69321.bond
rokidu.info
havuonvanthanh.store
hiteelephant.online
ghkp.shop
uabf.info
ynthesizerwf.store
kipthegaames.online
92.info
ahjongwins3.cyou
laygroundsequipment.xyz
dhd-treatment-42199.bond
yallergies.online
wefright.net
ancasterequinemassage.net
onja.shop
lugsq.info
rilby.store
nitogel.skin
yskillandyou.xyz
ackcleveland.biz
eziser.fun
uto-loans-in-africa-2024.today
nfluencer-marketing-38653.bond
06ks7.club
lossar.online
hinoplasty-solutions.sbs
y01.vip
r210.info
nfoviral99.xyz
wnyourhealth.xyz
olarmedia.xyz
obotquote.net
aklandpt.net
aifunclub.fit
uivlio.xyz
aromzeciri.shop
panda.xyz
cassg.net
rotableblender.online
ealthyzone.live
bewuxi.info
nline-advertising-37613.bond
mazonworld.store
aixabank.video
rginine555.store
igsawgame.xyz
rbantravelstories.online
engdianertian.vip
d97.lat
enamind.net
izalmart.shop
Targets
-
-
Target
SWIFT pdf.exe
-
Size
687KB
-
MD5
2c108e76865f4f65725c9f3410c87cd0
-
SHA1
0c3776f261d22cdb975e3faf7b2070b0febb3030
-
SHA256
124a32f23ee38371976744f5787e82d923cb0d2a366d75d6ca74a9a774a74a23
-
SHA512
7c3c1ce1321f0672b6f59b43f670a479506353b2070b207ead10338d65c21fd9b05ab862904c42764d796208527c7c42576d370ff3e47e82b42687afed8ba298
-
SSDEEP
12288:/Y2qghb7wmWrBpoMwnwVrG9R6hUBB3PaRHlOGiI818efoXFYiqp:w2dbK3xwnSrZOa2Gi3HoXy
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-