General
-
Target
fbgoodforsweetgirlvoiceniceforhearsagirlscute.hta
-
Size
15KB
-
Sample
250206-nmhn3svqhk
-
MD5
520f17f7af435832e77ae66293b4d1ca
-
SHA1
6ab857b3d3bff5a1f269646c5dbeef0d23c8005c
-
SHA256
d90c2332eb0e2dd1c54e8ce03e559230bb13848df371e0d76ca4507238463c35
-
SHA512
d9b97f6a54ec964a741647461c412e67efc80d912d8691c49799f24e83f263b6095b0779ef613265da7a249f86d7a195708ff813a04c7e6c9ee87ea13b319348
-
SSDEEP
96:rjCYo4DxCYoJUDzzUOPtQf04kcFbXYCYoNCYo4D6CYoM+:3o4DRoiDzzUdTNXooto4DCo/
Static task
static1
Behavioral task
behavioral1
Sample
fbgoodforsweetgirlvoiceniceforhearsagirlscute.hta
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
b101
ent-apartments-2801.click
lsyw.top
eccurastock.online
j958.net
eepelement.tech
rueblueimpact.shop
etechhome.net
ianchui.cfd
mall-business-22321.bond
tatewidefinancialservices.net
orbitmac.info
ovehkjepe88.club
zzhmamn.xyz
uslimbooking.net
uto253.pro
ortalexpresscliepr.lat
tikk.shop
iaoniang.cfd
sdg-6603.cyou
myd.net
motionen-es.online
dnrkdek.xyz
areo.care
tockcoin.online
ilvaguard.info
estserverhost.net
ndda.tokyo
atieowen.art
eviewedapproved.net
nujstore.online
-incad-id017.top
eat-pumps-40508.bond
ngjbmfi.xyz
pepeb.xyz
eancaba.net
hmadfawad.realtor
ratinacaite.top
etcal.shop
hostassets.sucks
gsn.xyz
345.top
rkzqzxp.xyz
azablog.online
klerip.xyz
mjoh.info
69.fyi
ashqhshhq-hqaishahsq.cyou
obri.online
k7nsfyf.top
ulebuy.website
al5.xyz
nsac-atendimentos.online
linko-win.art
eroplane.bet
ahilamoney.world
ires-70107.bond
8zhuan357.yachts
ometa-casino-hzu.top
kdigitaltouchclass.online
ildiztek.xyz
andar-jaya4d.info
ayna.website
in-up-casino-nvq8.top
eepseek-ai-assistant.online
3rdwi.click
Targets
-
-
Target
fbgoodforsweetgirlvoiceniceforhearsagirlscute.hta
-
Size
15KB
-
MD5
520f17f7af435832e77ae66293b4d1ca
-
SHA1
6ab857b3d3bff5a1f269646c5dbeef0d23c8005c
-
SHA256
d90c2332eb0e2dd1c54e8ce03e559230bb13848df371e0d76ca4507238463c35
-
SHA512
d9b97f6a54ec964a741647461c412e67efc80d912d8691c49799f24e83f263b6095b0779ef613265da7a249f86d7a195708ff813a04c7e6c9ee87ea13b319348
-
SSDEEP
96:rjCYo4DxCYoJUDzzUOPtQf04kcFbXYCYoNCYo4D6CYoM+:3o4DRoiDzzUdTNXooto4DCo/
-
Formbook family
-
Formbook payload
-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-