General
-
Target
payment SWIFT pdf.exe
-
Size
735KB
-
Sample
250206-p8qggsxmfj
-
MD5
ed9369e24644b25d49b00072be1543f5
-
SHA1
0c7eb11a4365a8d2c488b512f69bdb682d95cc9a
-
SHA256
a726c5a24472b6e81e1dce922e3d462a1abda9da5bdb28c0f3893850560b1fbd
-
SHA512
c9702ade8907c87b14bdb1f5d84cd0952a3a6f1fcccf1966773f56d5b0c28044705eb9fbcc0cb028a850c63ff0c19e5f151696b92960bce012b1e5447edd22a8
-
SSDEEP
12288:Whn8nFllff8PcCPda11zL+GC9euIZsTilbNHwJm8LoNR8Vr8B6slRIp7:Wh8hsVPkXaGmJIOkYXLoNR2lsRG7
Static task
static1
Behavioral task
behavioral1
Sample
payment SWIFT pdf.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
o10c
regnancy-67873.bond
oppyworld.fun
oomoo.store
illyjolly.online
-avi.art
unisitri.net
unaid-jamshed.shop
ookcovers.xyz
estrated.xyz
rpa.club
4rcraft.online
litz.baby
lysiannails.art
commerce-69321.bond
rokidu.info
havuonvanthanh.store
hiteelephant.online
ghkp.shop
uabf.info
ynthesizerwf.store
kipthegaames.online
92.info
ahjongwins3.cyou
laygroundsequipment.xyz
dhd-treatment-42199.bond
yallergies.online
wefright.net
ancasterequinemassage.net
onja.shop
lugsq.info
rilby.store
nitogel.skin
yskillandyou.xyz
ackcleveland.biz
eziser.fun
uto-loans-in-africa-2024.today
nfluencer-marketing-38653.bond
06ks7.club
lossar.online
hinoplasty-solutions.sbs
y01.vip
r210.info
nfoviral99.xyz
wnyourhealth.xyz
olarmedia.xyz
obotquote.net
aklandpt.net
aifunclub.fit
uivlio.xyz
aromzeciri.shop
panda.xyz
cassg.net
rotableblender.online
ealthyzone.live
bewuxi.info
nline-advertising-37613.bond
mazonworld.store
aixabank.video
rginine555.store
igsawgame.xyz
rbantravelstories.online
engdianertian.vip
d97.lat
enamind.net
izalmart.shop
Targets
-
-
Target
payment SWIFT pdf.exe
-
Size
735KB
-
MD5
ed9369e24644b25d49b00072be1543f5
-
SHA1
0c7eb11a4365a8d2c488b512f69bdb682d95cc9a
-
SHA256
a726c5a24472b6e81e1dce922e3d462a1abda9da5bdb28c0f3893850560b1fbd
-
SHA512
c9702ade8907c87b14bdb1f5d84cd0952a3a6f1fcccf1966773f56d5b0c28044705eb9fbcc0cb028a850c63ff0c19e5f151696b92960bce012b1e5447edd22a8
-
SSDEEP
12288:Whn8nFllff8PcCPda11zL+GC9euIZsTilbNHwJm8LoNR8Vr8B6slRIp7:Wh8hsVPkXaGmJIOkYXLoNR2lsRG7
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-