General
-
Target
PURCHASE ORDER.doc
-
Size
20KB
-
Sample
211117-rt5zqshhdr
-
MD5
24872831ee195b2e47de970c480da95a
-
SHA1
630e777e9aa508c80c276a38f03e7ffc3f76f574
-
SHA256
fc8b0c765bad790308ddd1865cc47009348aef515b4edbd2bee5c17dbecca1a7
-
SHA512
d2b93bf5e5971612d033ff49c5e19c79cc9631f111d0a07222919da3d18504d3ab5186722e1d33cd76906acd80e602548a88358415568b1a36bb9f515cb0ef1b
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.doc
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
PURCHASE ORDER.doc
Resource
win10-en-20211104
Malware Config
Extracted
formbook
4.1
ob7y
http://www.metanewsroom.net/ob7y/
ipsdjf.com
mlphntec.com
restaurant-day.store
writeramylong.com
flokigamefi.com
usetianyi.xyz
punishstrikebreaker.quest
ericnfleming.com
dhhwtieen.xyz
milfhackers.com
fewefie.store
pithstsdiet.store
kirsten-hemmerich.com
casinolopoca.com
sigag.xyz
geilepoes.com
metawhatsapp.art
sarjin.xyz
toprabatte.net
lotofbrave.club
ladydunyasi.com
oeooaoio.xyz
ifarh.com
geovaluablehack.com
heatherwoodrealestate.com
788027.com
groweth2gloweth.com
corryandbee.com
chatech.community
defholdingsus.com
gymandsports213.sbs
safaknet.com
rnisk.store
yhsps.com
taxlawyeral.com
liberiathelandofreturn.net
beniclothingstore.com
onecashadvance.com
metawhatsapp.delivery
chseovx.xyz
fiftyix.com
ambassadorbed.com
doktorhelp.com
memoryck.com
ceto21.com
zomerubo.rest
tyoutrannyvidep.com
3cbzfhhx5.com
cryleo.com
thebigass.online
ofd-trade-sender.com
elchinazizov.com
shakilimam.com
soporhojecast.com
reyestacosrestaurant.com
supdeszka.com
kredit-option.com
sharonallenart.com
destockage-international.com
immediate-edge-pl.xyz
jmsjszc.com
mojuwangluo.com
tr4ders.com
zilingodigitize.com
Targets
-
-
Target
PURCHASE ORDER.doc
-
Size
20KB
-
MD5
24872831ee195b2e47de970c480da95a
-
SHA1
630e777e9aa508c80c276a38f03e7ffc3f76f574
-
SHA256
fc8b0c765bad790308ddd1865cc47009348aef515b4edbd2bee5c17dbecca1a7
-
SHA512
d2b93bf5e5971612d033ff49c5e19c79cc9631f111d0a07222919da3d18504d3ab5186722e1d33cd76906acd80e602548a88358415568b1a36bb9f515cb0ef1b
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-