General
-
Target
rNew_PO178391922RFQAmended.exe
-
Size
1.0MB
-
Sample
250327-ppmlgs1zdx
-
MD5
6af2e8d3a281642512d1dfc59619f83c
-
SHA1
7a4fe8bfa3c98873a8d73e2b8054aac34d42f448
-
SHA256
68812ea5d94f9af1fab9e3b3241390fb7404a4107bf610ca7ba21678cf500d46
-
SHA512
af2c82e5953be56c3bf020d463f216b7b4ccab1495bfa87a1ab56b31f98bd78c6417793ad8954e974cd2a3a658d1d9cef2a54d47249c01af7f27cbdb25e46598
-
SSDEEP
24576:au6J33O0c+JY5UZ+XC0kGso6Fa2XWR43fLDfYER/bdGWY:su0c++OCvkGs9Fa2Xq43fffbjY
Static task
static1
Behavioral task
behavioral1
Sample
rNew_PO178391922RFQAmended.exe
Resource
win7-20241023-en
Malware Config
Extracted
formbook
4.1
ts49
aytolljqp.vip
ibnllc.net
impiezasvalladolid.net
reteon.xyz
edeliva.net
qynja.top
eometricdesigns.shop
64784p6.top
odhipoteke.online
ilezjan.net
om-dt02.cyou
xoticgirldrip.net
2livegames.live
ona88.skin
enerator-bcq.xyz
hared-office-4198379.zone
uyer.net
pilirplink.fun
t38asc.net
ntalyaescortking.site
aulinien.studio
atch-making.fun
inidnarenartp.autos
nxivki.digital
athryncarter.art
s-slay-slay.shop
grexiuy.xyz
fwsafuyfwq-fwqhufwqhfw.icu
tylescanner.vip
hot.pro
axfcw.top
xpr.net
ookinghealth.online
novifo.top
hn6.vip
s-sugardumplinkids.shop
ckdv.net
ykerconfg.info
18y6s10s.top
emoeuro.xyz
001.app
nlockpremiumquotemail.xyz
s94ngz.pro
terpsofcjzcf.life
adnames.art
xoticgirldrip.net
enbou-memberpage.net
enjandbeth.site
64gy.top
heseareafew.net
gsfxqt.top
ealfyxerlink.info
pmgo.net
provados.shop
uadapack.net
igua.one
ackomania.website
13b.xyz
eetfyxerworks.info
oranrbenedek.store
ersinfiltro.store
romanagementpro.pro
rojectdigitalkn.info
h0onueu.top
jxhttlgbx.xyz
Targets
-
-
Target
rNew_PO178391922RFQAmended.exe
-
Size
1.0MB
-
MD5
6af2e8d3a281642512d1dfc59619f83c
-
SHA1
7a4fe8bfa3c98873a8d73e2b8054aac34d42f448
-
SHA256
68812ea5d94f9af1fab9e3b3241390fb7404a4107bf610ca7ba21678cf500d46
-
SHA512
af2c82e5953be56c3bf020d463f216b7b4ccab1495bfa87a1ab56b31f98bd78c6417793ad8954e974cd2a3a658d1d9cef2a54d47249c01af7f27cbdb25e46598
-
SSDEEP
24576:au6J33O0c+JY5UZ+XC0kGso6Fa2XWR43fLDfYER/bdGWY:su0c++OCvkGs9Fa2Xq43fffbjY
-
Formbook family
-
Formbook payload
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-