General
-
Target
a71865f6a5424719dc6be97b17568ca9
-
Size
25KB
-
Sample
211122-qsc2wsaeg6
-
MD5
a71865f6a5424719dc6be97b17568ca9
-
SHA1
74159cf10d43fc070a8478c62eeee0d08de08cc9
-
SHA256
fe8985673f8978546bb57468fac3862e0a99ae32f05e145b78c71a08e50b6a25
-
SHA512
5a783e3e5e1e207802403bf2f6436354954a645f146fbc992a3572c01d7697f879dc673365006f5e549b458b8e4ec892e9f25b8058f7edee0861797fec39e2c2
Static task
static1
Behavioral task
behavioral1
Sample
a71865f6a5424719dc6be97b17568ca9.rtf
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
a71865f6a5424719dc6be97b17568ca9.rtf
Resource
win10-en-20211014
Malware Config
Extracted
formbook
4.1
9gr5
http://www.cuteprofessionalscrubs.com/9gr5/
newleafcosmetix.com
richermanscastle.com
ru-remonton.com
2diandongche.com
federaldados.design
jeffreycookweb.com
facecs.online
xmeclarn.xyz
olgasmith.xyz
sneakersonlinesale.com
playboyshiba.com
angelamiglioli.com
diitaldefynd.com
whenevergames.com
mtheartcustom.com
vitalactivesupply.com
twistblogr.com
xn--i8s140at3d6u7c.tel
baudelaireelhakim.com
real-estate-miami-searcher.site
131122.xyz
meta-medial.com
carvanaworkers.com
mimamincloor.com
aglutinarteshop.com
portal-arch.com
mandeide.com
golfteesy.com
carteretcancer.center
cuansamping.com
jhhnet.com
oetthalr.xyz
toesonly.com
ctbizmag.com
searchonzippy.com
plantedapts.com
matoneg.online
takened.xyz
meta4.life
africanizedfund.com
jukeboxjason.com
folez.online
troddu.com
802135.com
guiamat.net
gladiasol.com
meditationandyogacentre.com
metaverserealestateagent.com
boogyverse.net
melissa-mochafest.com
cozsweeps.com
pickles-child.com
metaversemediaschool.com
ahfyfz.com
ses-coating.com
pozada.biz
loldollmagic.com
mountfrenchlodge.net
25680125.xyz
inusuklearning.com
dnteagcud.xyz
yupan.site
acloud123.xyz
asadosdonchorizo.com
Targets
-
-
Target
a71865f6a5424719dc6be97b17568ca9
-
Size
25KB
-
MD5
a71865f6a5424719dc6be97b17568ca9
-
SHA1
74159cf10d43fc070a8478c62eeee0d08de08cc9
-
SHA256
fe8985673f8978546bb57468fac3862e0a99ae32f05e145b78c71a08e50b6a25
-
SHA512
5a783e3e5e1e207802403bf2f6436354954a645f146fbc992a3572c01d7697f879dc673365006f5e549b458b8e4ec892e9f25b8058f7edee0861797fec39e2c2
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-