General
-
Target
6086e2101717fd208b1f2b27d236d242
-
Size
586KB
-
Sample
250328-a8nwbssly3
-
MD5
6086e2101717fd208b1f2b27d236d242
-
SHA1
b47eb5dad7656f4ea4f520bffa2df5217c611efb
-
SHA256
712f4edfc3c0a1ad54060809bb9c39b0a1a355c8ebcb2cc377f100215a3f4150
-
SHA512
63a7e54bfc1693cb8e818fb95e843fa8b791ef07996073326c944b702dd53e1cafd794bc46611836311e5e2b057684cef06998a40647cd0ba09ff4ea3da2f96d
-
SSDEEP
12288:RfhpMHL/F+METLZNFKK/JFieyX7CXpCe9zJVGTP:gL/F+MEdV/JGrCXgeBJW
Static task
static1
Behavioral task
behavioral1
Sample
6086e2101717fd208b1f2b27d236d242.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
mj25
resencepeople.net
okebowlkoning.online
owevrcast.store
ynursery.xyz
isefyxerprotech.info
nventrobots-br.xyz
rojetos3d.shop
confyxerengine.info
litdugunsalonu.xyz
uporexinaluvo.click
attwecan.net
r154359.xyz
airtidy.store
headvancestore.shop
urolube.xyz
apnovis.online
adychef.shop
armhouse.world
unspotgambit.top
nline-dating-for-now.today
cicoon.live
602vuvetyy.pro
cdx4.site
ficonta.academy
riceradargeniusnow.xyz
43jknf137r.shop
rackyourbestofferinstantly.xyz
entors.services
etworktechnoki.pro
oelsharon.online
ecksbadgirls.net
dsigngroup.net
luffychao.online
oxgoblin.net
irtuousdesigns.net
fjjrrgc.shop
avabet168.london
rampedc.store
axpnqq.business
ythought.online
ogel.ltd
ebwcn.shop
16mb.top
ysnova.online
hejhls.top
uanyang.store
implyoganicbeautyl.shop
obatopup.store
uturelumen.net
yyjdrtcee.xyz
ioace-it.net
usthavelist.app
ephagallery.online
ggbj.top
ilmeonlibe.online
xbet-pxd.top
ezpravru10.top
eb3aipop.top
omfycoffeecorner.site
rtxcd.xyz
rok3.mobi
cientific-ethics.online
aa576ev5.top
gobpb.top
xploreshipscienceteam.info
Targets
-
-
Target
6086e2101717fd208b1f2b27d236d242
-
Size
586KB
-
MD5
6086e2101717fd208b1f2b27d236d242
-
SHA1
b47eb5dad7656f4ea4f520bffa2df5217c611efb
-
SHA256
712f4edfc3c0a1ad54060809bb9c39b0a1a355c8ebcb2cc377f100215a3f4150
-
SHA512
63a7e54bfc1693cb8e818fb95e843fa8b791ef07996073326c944b702dd53e1cafd794bc46611836311e5e2b057684cef06998a40647cd0ba09ff4ea3da2f96d
-
SSDEEP
12288:RfhpMHL/F+METLZNFKK/JFieyX7CXpCe9zJVGTP:gL/F+MEdV/JGrCXgeBJW
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-