General
-
Target
Payment.doc
-
Size
506KB
-
Sample
211101-lpmppshdf7
-
MD5
dc8382a437175146d43b5fccc5f96e22
-
SHA1
5c7926c514c5bdd3b90dd7505b6943b1487a3b1a
-
SHA256
d250d500cf7203a1e5a0cd460746d7e6b95e41b1fa7dafe6dd8fab07626aa675
-
SHA512
0ce19536f6e98913eeb1577e2b64f1b428b033bb2a3188417f4530a3912c2549a66ddd0136735aa19eb196283d80f50df0e405903cc70df91d0126e8cf2ffba7
Static task
static1
Behavioral task
behavioral1
Sample
Payment.doc.rtf
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Payment.doc.rtf
Resource
win10-en-20211014
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Targets
-
-
Target
Payment.doc
-
Size
506KB
-
MD5
dc8382a437175146d43b5fccc5f96e22
-
SHA1
5c7926c514c5bdd3b90dd7505b6943b1487a3b1a
-
SHA256
d250d500cf7203a1e5a0cd460746d7e6b95e41b1fa7dafe6dd8fab07626aa675
-
SHA512
0ce19536f6e98913eeb1577e2b64f1b428b033bb2a3188417f4530a3912c2549a66ddd0136735aa19eb196283d80f50df0e405903cc70df91d0126e8cf2ffba7
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-