General
-
Target
3.exe
-
Size
807KB
-
Sample
210913-kjayaagdem
-
MD5
b31db6d4d0fcb0a462723b7237afe716
-
SHA1
144d72ac115c4dc41323c9be5851edf7092f9781
-
SHA256
9599dc775b23d35f7e7603411551e0dad99126791b18982ac2e88584c607e214
-
SHA512
fc7b49b2c875600efc6fad2cb48237c58ec702bc0cca9e8a93baa43453fc53d5c10094408e5d2c9ec06a5278dac856dd677234dacff7f9974faf24ec38e06db9
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7v20210408
Malware Config
Extracted
formbook
4.1
3nop
http://www.jakesplacebarbers.com/3nop/
videohm.com
panache-rose.com
alnooncars-kw.com
trueblue2u.com
brussels-cafe.com
ip2c.net
influenzerr.com
rbcoq.com
zzful.com
drainthe.com
sumaholesson.com
cursosaprovados.com
genotecinc.com
dbrulhart.com
theapiarystudios.com
kensyu-kan.com
dkku88.com
tikhyper.com
aztecnort.com
homebrim.com
infinitilamp.com
leelegantflower.com
floor-space.investments
vidasustentavel.online
wholehearteddaughters.com
vipandeep.com
mdwovzrrm.icu
592215.com
academicplumbing.com
bestveganbook.com
theservantleader.com
nazarickdeveloper.xyz
delta-wing.com
girlfriendsgarb.com
sezyz11.com
ca3construction.com
smartswitchhomeloan.net
luckytwo.agency
ministry-of-barbers.com
babbageacademy.com
informationside.com
packapp.net
spacecoasthondaevent.com
thehealthyimmunereset.com
pjcavaliere.info
trebdurham.com
zhixintonghe.com
gon2580.com
dottproject.net
snakby.com
keeponsports.com
debbiewilsondesigns.com
stagingsolutionsgroup.com
forummondialdelamerbizerte.com
garnier.red
tempestchs.com
zpxinxi.com
jam-nins.com
inclusiocg.com
msmenders.com
whachupichu.com
pursemore.com
thebusinessfitclub.com
scootgotti.com
Targets
-
-
Target
3.exe
-
Size
807KB
-
MD5
b31db6d4d0fcb0a462723b7237afe716
-
SHA1
144d72ac115c4dc41323c9be5851edf7092f9781
-
SHA256
9599dc775b23d35f7e7603411551e0dad99126791b18982ac2e88584c607e214
-
SHA512
fc7b49b2c875600efc6fad2cb48237c58ec702bc0cca9e8a93baa43453fc53d5c10094408e5d2c9ec06a5278dac856dd677234dacff7f9974faf24ec38e06db9
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Suspicious use of SetThreadContext
-