General
-
Target
_BUSAN_HOCHIMINH_FEB.25.exe
-
Size
738KB
-
Sample
250328-bn2gcszyfy
-
MD5
08b4042d2a89ebcff8537ba458295e48
-
SHA1
91e3fd4718786c523620c31465232113580ea477
-
SHA256
388292015e4c2d075b935a8299d99335d957e3ad5134a33f28c4dc7f5e3687c5
-
SHA512
5be0e94d68f8d0599c9323bb4c03635a0e000ff541b9924f6b83eba8adeda55c9528c818093f690249f51cd1976389c77d841e7f373fb1b5d362ba57ea36a222
-
SSDEEP
12288:dwRl4Zby0chFFQWNd9M/VqnM2GQkTtZrD1fNABd0ioEXZm33h:elIbHchFv6/6TGQk7Ly0aJs
Static task
static1
Behavioral task
behavioral1
Sample
_BUSAN_HOCHIMINH_FEB.25.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
a04s
lovelyveganfoods.com
wahidi.net
hwcstl.com
psnews.today
depress-elastic.com
r3mixlogistics.com
crimeawartoken.com
changethewayyouseegreen.com
mfa-azubi.com
maximizeprofit.store
alternativesclimat.net
turkcellsuperonline.xyz
extractword.com
radiotec-solutions.com
flawlesscity.com
schatzbenifits.com
gymzf.xyz
runpa.site
cryptocdes.biz
harryhoppe.com
theatelierarch.com
roosterpoll.com
hauyuancg.com
themessingers.com
junzibuluo.com
pleasenamemyfart.com
certice.farm
bbundle.com
nftgiveaways.one
clearlakefishin.com
lojanivelup.site
pharmadermis.com
moneti.site
coralsiren.com
corporatespiral.com
olympiacosmeticdentist.com
harmony-impactcapital.com
bantipco.xyz
qqdy218.xyz
don-fago.website
sm207.net
freemy.solar
codigoderedenmexico.info
puls180.net
solvecodes.com
qqix.xyz
masfddj.com
keepwaterintheplants.com
ssqqzz.xyz
listgrind.com
sapi-app.com
ibuybuffalony.com
cryptopaid.cloud
brandiforcolleyville.com
cddy2.com
elartedelabelleza.com
vsywd.icu
treeshoes.com
alhazmteam.com
shop-tiger.net
solanahouseoflords.art
wfpcqez.xyz
mybiatromd.com
wrhyi.xyz
biohackingz.one
Targets
-
-
Target
_BUSAN_HOCHIMINH_FEB.25.exe
-
Size
738KB
-
MD5
08b4042d2a89ebcff8537ba458295e48
-
SHA1
91e3fd4718786c523620c31465232113580ea477
-
SHA256
388292015e4c2d075b935a8299d99335d957e3ad5134a33f28c4dc7f5e3687c5
-
SHA512
5be0e94d68f8d0599c9323bb4c03635a0e000ff541b9924f6b83eba8adeda55c9528c818093f690249f51cd1976389c77d841e7f373fb1b5d362ba57ea36a222
-
SSDEEP
12288:dwRl4Zby0chFFQWNd9M/VqnM2GQkTtZrD1fNABd0ioEXZm33h:elIbHchFv6/6TGQk7Ly0aJs
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-