General
-
Target
Soa.doc
-
Size
512KB
-
Sample
210119-s9k6y3w9ms
-
MD5
c8d6f663f18deded129dcd09717fac93
-
SHA1
d9693e9110dcb432447fa12d3e5d3a5e830a4984
-
SHA256
ff04de070992e03856e6f04a66c1fb8c0861c5e655eb13e8c0c1d266c73ea501
-
SHA512
eb2e2f252b891a75a3ae4e320c1059a07c06b5e3c4a39321211c9b9c0fe694f66f3c411a2a4799d712aa688e35f4f6a066b1ec4fa94626c70f52175578511be6
Static task
static1
Behavioral task
behavioral1
Sample
Soa.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Soa.doc
Resource
win10v20201028
Malware Config
Extracted
formbook
http://www.unitedfootballcamps.com/bf3/
ecatcom.com
what3emoji.com
primbathandbody.com
yt-itclub.com
newbieeer.com
getyoursofa.com
mexicanitems.info
catalogcardgames.net
leagueofwomengolfers.com
gvanmp.com
midnightsunhi.com
cnluma.com
sunsetcherrydesigns.com
cosmoproturkey.com
inifinityapps.net
making50masks.com
battalionice.com
uk-calculation.net
frosteatlove.com
bs-mag.com
cuisd.life
searchlx.com
treycorbies.com
excellencepi.com
4week-keto-results.com
rotationdietplan.com
chinahousecoralville.com
xidao168.com
detuimelaar.com
fairschedulinglaws.com
jinnolouie.com
expresslacross.com
akealuminum.com
madebazar.com
phimixx.com
jel-tv365.com
shakahats.com
thabaddieztrap.net
petsglorious.com
misuperblog.com
scorebuddycx.com
sgbsmb.com
coolbeanstudios.com
khitthihonvidai.com
myattorneychoicesyoufind.info
thenewsdig.com
freeuikit.net
everydaycollars.com
carrerco.com
reviewdrkofford.com
dragonflyroad.com
quinple.com
kollektiv.agency
cimbank.info
productoshealthyandfun.com
dovecuwnebawe.com
saihohealth.com
thehostingroad.com
tadalafil.website
whereiswillgroup.com
ukchealth.com
alaskanoddgoods.com
praktik-stuff.online
gaiactg.com
Targets
-
-
Target
Soa.doc
-
Size
512KB
-
MD5
c8d6f663f18deded129dcd09717fac93
-
SHA1
d9693e9110dcb432447fa12d3e5d3a5e830a4984
-
SHA256
ff04de070992e03856e6f04a66c1fb8c0861c5e655eb13e8c0c1d266c73ea501
-
SHA512
eb2e2f252b891a75a3ae4e320c1059a07c06b5e3c4a39321211c9b9c0fe694f66f3c411a2a4799d712aa688e35f4f6a066b1ec4fa94626c70f52175578511be6
-
Formbook Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-