General
-
Target
new order..xlsx
-
Size
824KB
-
Sample
211124-pep9mafgd3
-
MD5
13207cd20233a5ce5b2c4a27513d9a06
-
SHA1
43a79651932f17a6fcd2939c778f2ec2453004f4
-
SHA256
7fe64335c809c9215feae77093350074fa753aea2439d3d8a5e30c951da11eea
-
SHA512
f6db4b61137df01cdb5b4604f680557bc793842b11c334a2c23f8fd20549c85d5573cdcb7cebd596caec1d846181cf81edfa0b4775d4827df4b7aeafaed0883e
Static task
static1
Behavioral task
behavioral1
Sample
new order..xlsx
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
new order..xlsx
Resource
win10-en-20211014
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Targets
-
-
Target
new order..xlsx
-
Size
824KB
-
MD5
13207cd20233a5ce5b2c4a27513d9a06
-
SHA1
43a79651932f17a6fcd2939c778f2ec2453004f4
-
SHA256
7fe64335c809c9215feae77093350074fa753aea2439d3d8a5e30c951da11eea
-
SHA512
f6db4b61137df01cdb5b4604f680557bc793842b11c334a2c23f8fd20549c85d5573cdcb7cebd596caec1d846181cf81edfa0b4775d4827df4b7aeafaed0883e
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-