General
-
Target
SMC INQUIRY.doc
-
Size
1.6MB
-
Sample
211104-bvzlcafeh9
-
MD5
c3f435c1711eb57e13acd2cb1fdf04a2
-
SHA1
a4cedd66c27cf1aaed9ebf9fc0deb1f82dc937c3
-
SHA256
88d6f042585c2e129d891c4bb6217544c7d8cc2a814d4bb61cd7359165e4af84
-
SHA512
680adaff375d64c034eba36bd73cbcfc34978fb3fca660e2d6d2d8ab3809f24fb036f747d328c1d95f15b02c68df95b161950820e559b28e27fecb6d5cdbad8e
Static task
static1
Behavioral task
behavioral1
Sample
SMC INQUIRY.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
SMC INQUIRY.doc
Resource
win10-en-20211014
Malware Config
Extracted
formbook
4.1
s18y
http://www.agentpathleurre.space/s18y/
jokes-online.com
dzzdjn.com
lizzieerhardtebnaryepptts.com
interfacehand.xyz
sale-m.site
block-facebook.com
dicasdamadrinha.com
maythewind.com
hasari.net
omnists.com
thevalley-eg.com
rdfj.xyz
szhfcy.com
alkalineage.club
fdf.xyz
absorplus.com
poldolongo.com
badassshirts.club
ferienwohnungenmv.com
bilboondokoak.com
ambrosiaaudio.com
lifeneurologyclub.com
femboys.world
blehmails.com
gametimebg.com
duytienauto.net
owerful.com
amedicalsupplyco.com
americonnlogistics.com
ateamautoglassga.com
clickstool.com
fzdzcnj.com
txtgo.xyz
izassist.com
3bangzhu.com
myesstyle.com
aek181129aek.xyz
daoxinghumaotest.com
jxdg.xyz
restorationculturecon.com
thenaturalnutrient.com
sportsandgames.info
spiderwebinar.net
erqgseidx.com
donutmastermind.com
aidatislemleri-govtr.com
weetsist.com
sunsetschoolportaits.com
exodusguarant.tech
gsnbls.top
huangdashi33.xyz
amazonretoure.net
greathomeinlakewood.com
lenovoidc.com
qiuhenglawfirm.com
surveyorslimited.com
carterscts.com
helmosy.online
bakersfieldlaughingstock.com
as-payjrku.icu
mr-exclusive.com
givepy.info
ifvita.com
obesocarpinteria.online
Targets
-
-
Target
SMC INQUIRY.doc
-
Size
1.6MB
-
MD5
c3f435c1711eb57e13acd2cb1fdf04a2
-
SHA1
a4cedd66c27cf1aaed9ebf9fc0deb1f82dc937c3
-
SHA256
88d6f042585c2e129d891c4bb6217544c7d8cc2a814d4bb61cd7359165e4af84
-
SHA512
680adaff375d64c034eba36bd73cbcfc34978fb3fca660e2d6d2d8ab3809f24fb036f747d328c1d95f15b02c68df95b161950820e559b28e27fecb6d5cdbad8e
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-