General
-
Target
Order MT731.zip
-
Size
623KB
-
Sample
250206-nf8lxsvpdr
-
MD5
a1184d16c7144e97728872e1d9e94dcf
-
SHA1
04280ac473c752ae9ce80b7bcf15910e2699e55c
-
SHA256
af513d29b85d31f14ab178086a4ee93d6378965aa79353d81ad961009839846f
-
SHA512
6a499f244df82e7393d244dffbe987770da539c4d9c47415fa5d4510e84550a9e8c7000ed5f790d6e502dcaca1b0499f4dae70e386dbcb6d02cdc0f5b2ff221d
-
SSDEEP
12288:JnoAJl4Q6jhKLjruArp8QB4Q5Uq5/iOW3TPLuIgdslpG:1kNjhK/ruArp8ydPEXdgd08
Static task
static1
Behavioral task
behavioral1
Sample
Order MT731.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
a01d
eniorshousing05.shop
rywisevas.biz
4726.pizza
itchen-design-42093.bond
3456.tech
4825.plus
nlinecraps.xyz
itamins-52836.bond
nfluencer-marketing-40442.bond
nline-advertising-58573.bond
rautogroups.net
limbtrip.net
oftware-download-14501.bond
nline-advertising-66733.bond
erity.xyz
xknrksi.icu
x-ist.club
yber-security-26409.bond
oincatch.xyz
onitoring-devices-34077.bond
hbvc.xyz
xecadminadvo.vip
ookers.homes
irlypods.shop
nalyzator.fun
rinciple.press
ejigghq.company
nity-officiels.shop
chtm.info
ggrupdanismanlik.online
alterjaviersemolic.online
6zc.lat
ukce.fun
ikretgunay.online
d8ns7gu.skin
06ks7.club
icovideo.voyage
nlinetutoringcanada776681.icu
etzero.icu
228080a0.buzz
agoslotoke.art
ruaim.online
nline-mba-87219.bond
oldsaver.biz
agonel.online
ommbank.video
indlab.shop
hesweettray.store
bilebe.info
uxemasculine.store
arkbarron.xyz
ektor.fun
8255.pizza
ike-loans-53803.bond
ong-ya.info
costcomembers-wholesale.online
75396.vip
leaning-services-53131.bond
uickcabinet.net
alifstorch.online
ahtel.net
usinessoverpleasure.shop
duway.pro
usiness-software-47704.bond
ustonehuman.info
Targets
-
-
Target
Order MT731.exe
-
Size
739KB
-
MD5
4307f325dca2ca7195021deaf05f072a
-
SHA1
d549f686ea1a0e5afa4bf4d30127d8d287e3385d
-
SHA256
682ea9386cf6916b93cd4d71b6e9a56766178c8479e9a5121ca42672d4680754
-
SHA512
59686aa8372d49625f93de18ee554ae4573f3b85b270c167a306b7580368b2f84caa45e77cb25b0862421f94b6de2d3c8b5f94b9a8b4e93072e635b12c4f8aea
-
SSDEEP
12288:cizKd+vKPJplNata+Ljpua3pFGdxXB4Q5aSaw/a/EQG0VMwE1J+28B6slRIpKx:3z2+yLrata+/pua3pF4daSVC/HGIT6sB
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-