General
-
Target
PO-20212222.doc
-
Size
16KB
-
Sample
211123-dera5scch7
-
MD5
66335be4bd27323b18d8a32e151f6b5d
-
SHA1
0e71ed1acb7cd7d1328cb3ddf7a3640082001710
-
SHA256
7d9353470f1226a0cebac4364de36ebe88677e3b46755eb09732b24fc3aace89
-
SHA512
aa9ab4e7ee6c4aa47b3f8a91abc675869d2718d3f38fc2b4b3e9ff9c70c45e5ff6301bc926cf78fd1d52dc2548a6ca8d9748665ff6554a3aa36c4621e5ef7dc5
Static task
static1
Behavioral task
behavioral1
Sample
PO-20212222.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
PO-20212222.doc
Resource
win10-en-20211104
Malware Config
Extracted
formbook
4.1
ob7y
http://www.metanewsroom.net/ob7y/
ipsdjf.com
mlphntec.com
restaurant-day.store
writeramylong.com
flokigamefi.com
usetianyi.xyz
punishstrikebreaker.quest
ericnfleming.com
dhhwtieen.xyz
milfhackers.com
fewefie.store
pithstsdiet.store
kirsten-hemmerich.com
casinolopoca.com
sigag.xyz
geilepoes.com
metawhatsapp.art
sarjin.xyz
toprabatte.net
lotofbrave.club
ladydunyasi.com
oeooaoio.xyz
ifarh.com
geovaluablehack.com
heatherwoodrealestate.com
788027.com
groweth2gloweth.com
corryandbee.com
chatech.community
defholdingsus.com
gymandsports213.sbs
safaknet.com
rnisk.store
yhsps.com
taxlawyeral.com
liberiathelandofreturn.net
beniclothingstore.com
onecashadvance.com
metawhatsapp.delivery
chseovx.xyz
fiftyix.com
ambassadorbed.com
doktorhelp.com
memoryck.com
ceto21.com
zomerubo.rest
tyoutrannyvidep.com
3cbzfhhx5.com
cryleo.com
thebigass.online
ofd-trade-sender.com
elchinazizov.com
shakilimam.com
soporhojecast.com
reyestacosrestaurant.com
supdeszka.com
kredit-option.com
sharonallenart.com
destockage-international.com
immediate-edge-pl.xyz
jmsjszc.com
mojuwangluo.com
tr4ders.com
zilingodigitize.com
Targets
-
-
Target
PO-20212222.doc
-
Size
16KB
-
MD5
66335be4bd27323b18d8a32e151f6b5d
-
SHA1
0e71ed1acb7cd7d1328cb3ddf7a3640082001710
-
SHA256
7d9353470f1226a0cebac4364de36ebe88677e3b46755eb09732b24fc3aace89
-
SHA512
aa9ab4e7ee6c4aa47b3f8a91abc675869d2718d3f38fc2b4b3e9ff9c70c45e5ff6301bc926cf78fd1d52dc2548a6ca8d9748665ff6554a3aa36c4621e5ef7dc5
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-