General
-
Target
f206c3a093c6174558ea0646b12e262d8549bee2255418d8968d3e0bb7218330.exe
-
Size
761KB
-
Sample
250207-gne61ssqbn
-
MD5
bc2dc18dd7aa454ec5fbfc577b222a80
-
SHA1
6e61da98308d4a79f8a365163c78dd42e4620f97
-
SHA256
f206c3a093c6174558ea0646b12e262d8549bee2255418d8968d3e0bb7218330
-
SHA512
89c3b46e02fd78785dba75983f038c0bd3362d3359bea8601ef3f06aec40481e8ec103da554b45112bbd9e9b2ff4d7292aeed3922db4e89414c9f4c26fa98b22
-
SSDEEP
12288:xSHiFvOGRwS4Sydcb8bfUosGH6d3TpWPYjG+UZdJAyhBVEU28B6slRIp:4HiUGRsSyGbydHG3TpjjG+UrZuU6sRG
Static task
static1
Behavioral task
behavioral1
Sample
f206c3a093c6174558ea0646b12e262d8549bee2255418d8968d3e0bb7218330.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
kmge
i54ly657ur.autos
stove-10000.bond
furkanenes.live
foziaclothing.shop
peron.app
landscaping-services-88568.bond
home-remodeling-96005.bond
offersnow-store.shop
apsida.tech
ux-design-courses-90368.bond
nb-event-b2b.online
2tdb3dk65m.skin
juniper.fit
eurosirel.info
web-cfe.one
a48268104.top
darkoxygen.info
beautysideup.shop
solar-battery-34557.bond
dib57.top
apihoki.live
cinholiao3.click
binxbress-bd-w8-em.shop
car-loans-78152.bond
cypher.casino
go88l.club
youyou0612.cfd
car-deals-93792.bond
ft0722a9usj38.shop
zxxzaanm.top
getc.pro
son37.club
bakingcourse01.today
refpalhsdx.top
sweethome4.buzz
yaqpqljcwmhesaj.buzz
gsolartech.com
nw0qbr.top
sakanatei.net
home-care-access-new-promo.bond
llama3-2video.net
douromaintenance.info
joycasino-hem.top
cg-qu.xyz
bogotienda.online
010jcgk.com
solar-systems-panels-50320.bond
cosmetics-30710.bond
pgfnrecuperacao.store
imples.live
bnckdaae.top
silviarusina.shop
krainedating.info
maskverifyemail.online
ttrading.pro
trendy-style.store
miranda-j.online
030003741.xyz
hoteldanibaan.info
zunica.shop
ftth.monster
c87xy374jt.bond
yhy05.cfd
blueoceanfilm.institute
lapostehotel.one
Targets
-
-
Target
f206c3a093c6174558ea0646b12e262d8549bee2255418d8968d3e0bb7218330.exe
-
Size
761KB
-
MD5
bc2dc18dd7aa454ec5fbfc577b222a80
-
SHA1
6e61da98308d4a79f8a365163c78dd42e4620f97
-
SHA256
f206c3a093c6174558ea0646b12e262d8549bee2255418d8968d3e0bb7218330
-
SHA512
89c3b46e02fd78785dba75983f038c0bd3362d3359bea8601ef3f06aec40481e8ec103da554b45112bbd9e9b2ff4d7292aeed3922db4e89414c9f4c26fa98b22
-
SSDEEP
12288:xSHiFvOGRwS4Sydcb8bfUosGH6d3TpWPYjG+UZdJAyhBVEU28B6slRIp:4HiUGRsSyGbydHG3TpjjG+UrZuU6sRG
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-