General
-
Target
PO4018308875.doc
-
Size
49KB
-
Sample
210722-lag6xvp1r6
-
MD5
1e7bc879d7960afaa08148c635ae534f
-
SHA1
e1a0db056bdc1cba07ef43c27a80e5bfd79b4eac
-
SHA256
8c4b07ce49252a4ed12ad611a9f8fde65a63fc12368c6726776e86e140d3872e
-
SHA512
87305e45665309e3e6de38aae33a61481445257cbef1f4ce268db0223481bb6b0acaed8d81aafee00a43d53b0278fd27a2fcd34ef51b670ca86c34108ea49366
Static task
static1
Behavioral task
behavioral1
Sample
PO4018308875.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
PO4018308875.doc
Resource
win10v20210410
Malware Config
Extracted
formbook
4.1
http://www.containerflippers.com/np0c/
spartansurebets.com
threelakestradingco.com
metaspace.global
zjenbao.com
directlyincluded.press
peterchadri.com
learnhousebreaking.com
wonobattle.online
leadate.com
shebafarmscali.com
top4thejob.online
awakeyourfaith.com
bedford-st.com
lolwhats.com
cucurumbel.com
lokalbazaar.com
matter.pro
eastcountyanimalrescue.com
musesgirl.com
noordinarydairy.com
saigonstar2.com
farmacias-aranda.com
fjzzck.com
createandelevate.solutions
australiavapeoil.com
imperfectlymassabella.com
criminalmindeddesign.com
silverstoneca.com
scotlandpropertygroup.com
3dvbuild.com
privatebeautysuites.com
driplockerstore.com
rcdesigncompany.com
2141cascaderdsw.com
mybbblog.com
bodyambrosia.com
solitudeblog.com
coworkingofficespaces.com
9999cpa.com
flipwo.com
dynamicfitnesslife.store
anandsharmah.com
afyz-jf7y.net
erikagrandstaff.com
pumpfoil.com
bodurm.com
goldlifetime.com
a1organ.com
akomandr.com
hsavvysupply.com
dyvyn.com
bizlikeabosslady.network
livein.space
helpafounderout.com
orbmena.com
mrrodgersrealty.com
roxhomeswellington.com
klimareporter.com
1040fourthst405.com
blackbuiltbusinesses.com
solidswim.com
lordetkinlik3.com
gardencontainerbar.com
viperporn.net
Targets
-
-
Target
PO4018308875.doc
-
Size
49KB
-
MD5
1e7bc879d7960afaa08148c635ae534f
-
SHA1
e1a0db056bdc1cba07ef43c27a80e5bfd79b4eac
-
SHA256
8c4b07ce49252a4ed12ad611a9f8fde65a63fc12368c6726776e86e140d3872e
-
SHA512
87305e45665309e3e6de38aae33a61481445257cbef1f4ce268db0223481bb6b0acaed8d81aafee00a43d53b0278fd27a2fcd34ef51b670ca86c34108ea49366
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-