General
-
Target
oorr44771.exe
-
Size
255KB
-
Sample
211020-pv673shhgr
-
MD5
a9529e72ea3c3b4f0c5dfe1915c17a8a
-
SHA1
a2f76981ad79f9358a5ac54ed9ae9ecb47a45286
-
SHA256
9f35623c249226a739c810db0da1b7332b9d98222e9e50c8aaa001edcf505af1
-
SHA512
4b5323e779f6a0b2f78793004b6c7e8b7bba3be373fc67a9d6471bf95baeb2b38855068c423d49b76ba3fc153a6a100157ad0487230de5471b8de42ab2e152b4
Static task
static1
Behavioral task
behavioral1
Sample
oorr44771.exe
Resource
win7-en-20210920
Malware Config
Extracted
formbook
4.1
rv9n
http://www.cjspizza.net/rv9n/
olivia-grace.show
zhuwww.com
keiretsu.xyz
olidnh.space
searuleansec.com
2fastrepair.com
brooklynmetalroof.com
scodol.com
novaprint.pro
the-loaner.com
nextroundscap.com
zbwlggs.com
internetautodealer.com
xn--tornrealestate-ekb.com
yunjiuhuo.com
skandinaviskakryptobanken.com
coxivarag.rest
ophthalmologylab.com
zzzzgjcdbqnn98.net
doeful.com
beatthebank.fund
deposit-pulsa2021.xyz
uptownsecuritysystems.com
thegroveonglendale.com
destinationth.com
healthcareuninsured.com
longhang.xyz
ypxwwxjqcqhutyp.com
ip-15-235-90.net
rancholachiquita.com
macblog.xyz
skillsbazar.com
beatyup.com
academiapinto.com
myguagua.com
fto8y.com
ohioleads.net
paravocebrasil.com
thecanyonmanor.com
acu-bps.com
comunicaretresessanta.net
schwa-bingcorp.com
discountcouponcodes-jp.space
kufazo.online
metaverge.club
800car.online
brendanbaehr.com
garfieldtoken.net
secretfoldr.com
13itcasino.com
marketingatelier.net
computersslide.com
marcastudios.com
thestreetsoflondon.life
maintaintest.com
cronicasdebia.com
apm-app.com
sepulchral.xyz
lodha-project.com
theartofsoulwork.com
swimminglessonsshop.com
klarnabet.com
control-of-space.net
heliumathletic.com
Targets
-
-
Target
oorr44771.exe
-
Size
255KB
-
MD5
a9529e72ea3c3b4f0c5dfe1915c17a8a
-
SHA1
a2f76981ad79f9358a5ac54ed9ae9ecb47a45286
-
SHA256
9f35623c249226a739c810db0da1b7332b9d98222e9e50c8aaa001edcf505af1
-
SHA512
4b5323e779f6a0b2f78793004b6c7e8b7bba3be373fc67a9d6471bf95baeb2b38855068c423d49b76ba3fc153a6a100157ad0487230de5471b8de42ab2e152b4
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-