General
-
Target
60a18ac155bb681650c805dd3146c838161548b4612b597f757dafa109598ab8
-
Size
576KB
-
Sample
250205-kngxdszrel
-
MD5
997d8f0ec7c71a05c3b8fbbec7188ad4
-
SHA1
e2b90e2b8b2fa5a6cd9976c6ddd7d0321cb2a36f
-
SHA256
60a18ac155bb681650c805dd3146c838161548b4612b597f757dafa109598ab8
-
SHA512
f57d2d4b2bf0e2c2dfe7f964707fe048c5a1855eab86049973639ea183c9effd283437b449889186d5ebc821391b69375d3cccb9c7b86c20e423f83ac19e0c30
-
SSDEEP
12288:FuSRta+61b54xRGwAxrTEPrd+Exa2mxR6wsTcPkfXoWDOk9qP:FTRta34xarIjd+EDmxR6tTcPkfX+LP
Static task
static1
Behavioral task
behavioral1
Sample
last order.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
a01d
eniorshousing05.shop
rywisevas.biz
4726.pizza
itchen-design-42093.bond
3456.tech
4825.plus
nlinecraps.xyz
itamins-52836.bond
nfluencer-marketing-40442.bond
nline-advertising-58573.bond
rautogroups.net
limbtrip.net
oftware-download-14501.bond
nline-advertising-66733.bond
erity.xyz
xknrksi.icu
x-ist.club
yber-security-26409.bond
oincatch.xyz
onitoring-devices-34077.bond
hbvc.xyz
xecadminadvo.vip
ookers.homes
irlypods.shop
nalyzator.fun
rinciple.press
ejigghq.company
nity-officiels.shop
chtm.info
ggrupdanismanlik.online
alterjaviersemolic.online
6zc.lat
ukce.fun
ikretgunay.online
d8ns7gu.skin
06ks7.club
icovideo.voyage
nlinetutoringcanada776681.icu
etzero.icu
228080a0.buzz
agoslotoke.art
ruaim.online
nline-mba-87219.bond
oldsaver.biz
agonel.online
ommbank.video
indlab.shop
hesweettray.store
bilebe.info
uxemasculine.store
arkbarron.xyz
ektor.fun
8255.pizza
ike-loans-53803.bond
ong-ya.info
costcomembers-wholesale.online
75396.vip
leaning-services-53131.bond
uickcabinet.net
alifstorch.online
ahtel.net
usinessoverpleasure.shop
duway.pro
usiness-software-47704.bond
ustonehuman.info
Targets
-
-
Target
last order.exe
-
Size
883KB
-
MD5
5761dcb8640793699cd177a59cf2c0ed
-
SHA1
81ca3ccc56eae9b91b31ebe9f791e03226710204
-
SHA256
a7fc129cd3069c3c862c28990c131e3dae5fff42c5ab8cb034e8e8ea12bec94e
-
SHA512
a9c8020e098fac8e6bdab0ef0c09e42125e4c56b3b37c76ec7ba978c46620af95394b3f608482cc6ee9683d54457a095e0054902bd9d11cff368b64cc6bb6ff4
-
SSDEEP
12288:TLzUMXe5y/t1uKxREmoYctVxrTGVOuO8YSK2mxR6iL8S4tcJpDoRwe8QVDFzQhJ:TLlx8YmrCd/PZmxR6iLJxpER9VJQ
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-