General
-
Target
ETD101210182 HBL.xlsx
-
Size
2.3MB
-
Sample
210120-rhn84df9pa
-
MD5
b2081a672db023216f9688a9996937db
-
SHA1
c5a9d18874d2ce94cd2f34a616d58540fb60940c
-
SHA256
4d8d38beaefa856319c7092bd02208659f33329962b90bf6333f6ce35f1ac909
-
SHA512
f71c6c24a56d0fa275662cb5f11934dff0b6ea4e178a792d7788cb4abf33a8707a71caa870bb3e5da2309d0aa72404f5d3979109e203d0613b5065ebb5b57ac3
Static task
static1
Behavioral task
behavioral1
Sample
ETD101210182 HBL.xlsx
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ETD101210182 HBL.xlsx
Resource
win10v20201028
Malware Config
Extracted
formbook
http://www.waverunner-fan.com/pp2/
meredithridenhour.com
foundationsseniormanagement.com
sallyta.com
msmonlinellc.com
entreprisesfr.com
neadclunlounge.com
lexuscarbonfiber.com
electroglas-probers.com
investedgefinancialinc.com
blm.healthcare
workoutmagazinemx.com
edmondsagent.com
rodrigzart.com
standardstripcurtains.com
carrier.email
hifan.info
fhcqtravel.com
legacycream.com
topfurnity.com
solids-development.net
e-reklamcim.com
cookedabs.com
ecotime.info
rosalesingenieria.com
onehundredphotographs.com
brightwoodcollection.com
kafamrahat.pro
moveagronegocios.com
voltchargers.net
rgsjanitorial.com
oroinplastic.com
papelonlavapies.com
jayfloe.com
hotlinefx.com
anitrap.com
nehyam.com
vistas-del-valle.com
liliaandjohn.com
thelifehereafter.com
homepublishingonline.com
moneo-umu.com
99blogs.club
mauricemeade.com
55967w.com
yhel-official.com
auykypzna.club
theindiatrends.com
legnoartshopusa.com
dkbaits.com
fairandfitness.store
rakkutenn.icu
teamamlinhomevalue.com
stayweirdswim.uk
businesscouuntmanagement.com
zunebox.com
paracubaexpress.com
legantstylz.net
locomarket-kwt.com
kal-shop.com
guoyuan.plus
kocaeliguvercin.com
silverrosefd.co.uk
kunstatelier.net
gomoolah.com
Targets
-
-
Target
ETD101210182 HBL.xlsx
-
Size
2.3MB
-
MD5
b2081a672db023216f9688a9996937db
-
SHA1
c5a9d18874d2ce94cd2f34a616d58540fb60940c
-
SHA256
4d8d38beaefa856319c7092bd02208659f33329962b90bf6333f6ce35f1ac909
-
SHA512
f71c6c24a56d0fa275662cb5f11934dff0b6ea4e178a792d7788cb4abf33a8707a71caa870bb3e5da2309d0aa72404f5d3979109e203d0613b5065ebb5b57ac3
-
Formbook Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-