General
-
Target
orderYHu2022Q1 SMS 0124C4.doc
-
Size
12KB
-
Sample
220202-j7vf6ahgg5
-
MD5
1aa236116a153753d97549e50e0e3eb4
-
SHA1
f91ada10ffb9b8a4ddc496b93428c38a668fcc8b
-
SHA256
d95fbaa4ed83505726f05c48e7c5fb02d875fc6ac5971ce3fbfa8f2fe4b9f70a
-
SHA512
b370445046cfd541e26fa12469344a35b1ed964c95098b5203ab4325d947183e8a0812e57c5f1484f006845c834b300dd74346bf6045e23e61c2d3f5b588b092
Static task
static1
Behavioral task
behavioral1
Sample
orderYHu2022Q1 SMS 0124C4.rtf
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
orderYHu2022Q1 SMS 0124C4.rtf
Resource
win10v2004-en-20220113
Malware Config
Extracted
formbook
4.1
d7ln
bulut-imza.com
gotastebuds.com
shutupmags.com
clocksport.com
toweryachtcounsel.com
kingcopier.com
pluspersona.com
inchallahe.com
unclonedconsulting.com
ccdt168.com
tonyzheng.xyz
voiceoftheepeople.com
cicapital.xyz
offxpro.com
loyatiproductions.com
makemebuystuff.com
incuba8labs.com
remparka.com
newstft.com
bgame.pro
croniesnft.xyz
petaouchnock.site
gavesett.com
smarthousegroup.net
kkqdqj.mobi
glatdelate.quest
sharpmage.com
penis.today
squidscatter.com
digfinancial.com
imx.fund
bigbet3269.com
leatherlidinserts.net
eyecollection-nishigifu.com
wagyuchefs.com
cafeandbakecestbon.com
appsy.tech
johnmaxwelltam.com
eternity-warm.com
naebidynamic.com
landgrunt.com
chap-immo.com
wgzywz.com
zawovu.com
shortsvault.com
squidgameoutfitsss.com
keaneoil.com
v44881.com
spartanboardgames.com
rotcid.xyz
qvconsultants.com
reinorshine.com
turkeyetrade.com
webcomprei.com
00010shou.com
tiffanyandjose.com
todd4mayor.com
designbydb.com
higherj.com
delicatmnl.com
huamanishop.com
pinkle-store.com
gatewaytothegreatoceanroad.com
felerritst.quest
mottpolis.com
Targets
-
-
Target
orderYHu2022Q1 SMS 0124C4.doc
-
Size
12KB
-
MD5
1aa236116a153753d97549e50e0e3eb4
-
SHA1
f91ada10ffb9b8a4ddc496b93428c38a668fcc8b
-
SHA256
d95fbaa4ed83505726f05c48e7c5fb02d875fc6ac5971ce3fbfa8f2fe4b9f70a
-
SHA512
b370445046cfd541e26fa12469344a35b1ed964c95098b5203ab4325d947183e8a0812e57c5f1484f006845c834b300dd74346bf6045e23e61c2d3f5b588b092
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Sets service image path in registry
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-