General
-
Target
36e9bfc5337aa8a4dd2c8c24087a3cdc3f589df01ec12c0d81a28eb62b67b9e4.exe
-
Size
665KB
-
Sample
250227-c4fp9ssny6
-
MD5
78fe6d31c4628807f53c8114f6007111
-
SHA1
8d3ba0fe1b6cf783f21595b8e43c4da5ac6a370a
-
SHA256
36e9bfc5337aa8a4dd2c8c24087a3cdc3f589df01ec12c0d81a28eb62b67b9e4
-
SHA512
4cb3e835651f208e3a5e0f9022b6acfb94ffba6a6e2c281fca4f9a65d4f20c31e83b5e1af29c9e39aed5d3581fcbdfa3977a7bfec9c12fd4f7b26db09c5bf800
-
SSDEEP
12288:sO383le9ci9+zEn8fB6SWolRC8jiWBszT17zSF6:s43/+zEnSUkRC6i517c
Static task
static1
Behavioral task
behavioral1
Sample
36e9bfc5337aa8a4dd2c8c24087a3cdc3f589df01ec12c0d81a28eb62b67b9e4.exe
Resource
win7-20241023-en
Malware Config
Extracted
formbook
4.1
my18
cicotte.shop
tetrf.net
rkidnclothing.net
ibriz.online
49fb2ka.top
matic.xyz
yh.lol
f59m.club
vc-panels-coral.sbs
tpsx.top
ealturmat.xyz
sianglobalinvestment.site
ourpetia.online
q801.info
oslslat.store
gt77.net
skpmypqxn.xyz
nackcy.shop
abfyxerlink.info
rym.net
reenhive.energy
asinobest.casino
otorhomes-for-seniors-bear.sbs
ateriapg.net
uetedit.net
evalora.xyz
ali100.online
friquechoice.shop
ommunityministernetwork.net
aytollfpg.vip
avurenilopaxo.click
s588zg.top
mtkash.online
etttttt169.top
skconofdallas.net
y009.xyz
r836068.xyz
olankidigipro.online
volvefyxerprotech.info
irosat.pro
romosinevitaveis.shop
hh113.top
77.lol
yjapan-vpass.shop
cvban.xyz
elium.solutions
eimdallsupplychains.net
pabox.xyz
ahooodi.xyz
idadari29nice.makeup
utomotivacion.net
y046.xyz
acucardsvcs.online
35lfeq932r.shop
irtualvisionlk.pro
asis.rent
nkj89qv.top
hetollroads-paytollqqc.help
luspoints.store
elegslga.best
58mc.top
47gy.top
ontery.net
ie.info
b13t17.pro
Targets
-
-
Target
36e9bfc5337aa8a4dd2c8c24087a3cdc3f589df01ec12c0d81a28eb62b67b9e4.exe
-
Size
665KB
-
MD5
78fe6d31c4628807f53c8114f6007111
-
SHA1
8d3ba0fe1b6cf783f21595b8e43c4da5ac6a370a
-
SHA256
36e9bfc5337aa8a4dd2c8c24087a3cdc3f589df01ec12c0d81a28eb62b67b9e4
-
SHA512
4cb3e835651f208e3a5e0f9022b6acfb94ffba6a6e2c281fca4f9a65d4f20c31e83b5e1af29c9e39aed5d3581fcbdfa3977a7bfec9c12fd4f7b26db09c5bf800
-
SSDEEP
12288:sO383le9ci9+zEn8fB6SWolRC8jiWBszT17zSF6:s43/+zEnSUkRC6i517c
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-