General
-
Target
78e8787616a4d7be2eb5c127e75e3326de2c3e2dbf2a2533163f9594c0214b16.exe
-
Size
686KB
-
Sample
250205-egeksszmel
-
MD5
dc33f885728b308c7159ffd95a728331
-
SHA1
45ee3cf5a16ed7770a9e78bc2d09294128a38e6c
-
SHA256
78e8787616a4d7be2eb5c127e75e3326de2c3e2dbf2a2533163f9594c0214b16
-
SHA512
929e020d609a8e3d065df62f978cf787a60e63629d6d28eaf287a2f1b3b1e30c4ffb67ac509d26e32623087c3a4665f46067e0c1f36423d922f5d64a49779910
-
SSDEEP
12288:5RYpw+u2yCIxGFvNUuqjL8nk3iS7bbRVXMGeUbE0X2tpXEe2nBeZ5O6suWb3L/KF:Q91IQNNUbonqnTX9eUA0XAUeiE2
Static task
static1
Behavioral task
behavioral1
Sample
78e8787616a4d7be2eb5c127e75e3326de2c3e2dbf2a2533163f9594c0214b16.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
b02a
nnovate.host
yrvo.shop
obify.party
55665.one
vlisazouasiul.store
arjohbs.shop
mjsccc5716.shop
nfluencer-marketing-86606.bond
atellite-internet-74549.bond
arehouse-inventory-82506.bond
kanzaturf.net
airbypatrickmcguire.net
90880a15.buzz
ancake888.info
hopcroma.store
usinessloanscanada524285.icu
mdjr.world
9kct.xyz
ombrd.finance
luratu.xyz
commerce-97292.bond
ovies4u-hd.online
zmi.info
ealth-insurance-63745.bond
rypto-god.online
ustdesk.email
talezoom.asia
haf.international
heaterscm.net
rejo.info
nitedstatesofart.net
ental-implants-29843.bond
uzzleworld.xyz
fg0m9c0lk.cyou
emospin30.info
ocejo.africa
aqiwang.net
vgtdvchvmdsvmdhbvgv.pro
ymtech.digital
ok-vi.sbs
u5kt.net
heoneglobal.store
78158.legal
argloscaremedia.info
ailylife.pro
nfotj.live
obistores.online
irofprague.net
mpteamtoto88.today
rmap.xyz
zliving.xyz
ubesafari.video
aylee.blue
ery.rocks
udioevideo.store
oneymachine.show
885522a0.shop
oodchoices.xyz
ilano.shop
vikadi.info
ecoramay.store
kit.run
ookinguptolightup.net
ndata.net
ubbs.xyz
Targets
-
-
Target
78e8787616a4d7be2eb5c127e75e3326de2c3e2dbf2a2533163f9594c0214b16.exe
-
Size
686KB
-
MD5
dc33f885728b308c7159ffd95a728331
-
SHA1
45ee3cf5a16ed7770a9e78bc2d09294128a38e6c
-
SHA256
78e8787616a4d7be2eb5c127e75e3326de2c3e2dbf2a2533163f9594c0214b16
-
SHA512
929e020d609a8e3d065df62f978cf787a60e63629d6d28eaf287a2f1b3b1e30c4ffb67ac509d26e32623087c3a4665f46067e0c1f36423d922f5d64a49779910
-
SSDEEP
12288:5RYpw+u2yCIxGFvNUuqjL8nk3iS7bbRVXMGeUbE0X2tpXEe2nBeZ5O6suWb3L/KF:Q91IQNNUbonqnTX9eUA0XAUeiE2
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-