General
-
Target
Energypac Pty. Ltd.doc
-
Size
11KB
-
Sample
220202-jbtvrahdek
-
MD5
d3fe6624b0f044affcbd0ef54f646ec8
-
SHA1
2df87a6549c40d6492548e91180c417849557b8d
-
SHA256
fe17e03a00c4aee4bb8daa8507c1b9bc88a28f3f7c53f10f064a8dbbe7b3dc96
-
SHA512
5697394a1c40866fcfef79591f31247997f867942ee63553d892ad23f5928a429e133d2490f774acbd9580391071f53933f5833955a8dccf2a98a20462196b04
Static task
static1
Behavioral task
behavioral1
Sample
Energypac Pty. Ltd.rtf
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Energypac Pty. Ltd.rtf
Resource
win10v2004-en-20220112
Malware Config
Extracted
formbook
4.1
cw22
betvoy206.com
nftstoners.com
tirupatibuilder.com
gulldesigns.com
shemhq.com
boricosmetic.com
bitcoinbillionaireboy.com
theflypaperplanes.com
retrocartours.com
yangzhie326.com
cheepchain.com
sentryr.com
luckirentalhomes.com
pointssquashers.com
dianasarabiantreasures.com
calendarsilo.com
sublike21.xyz
gajubg0up.xyz
lousfoodreviews.com
fades.site
276a.xyz
chopkingstamp.com
parcelfrance.com
lcntrust.com
aeeg-austria.com
trogen24.net
widepeepohappy.xyz
hogekortingen.com
trump-is-right.net
legacyfarmsgeorgia.com
dingbuzhule.com
teckelgruppe-raben.com
qianshuhua.com
onsdia.xyz
sectorquant.com
automatenstudent.com
bathkithcenandtile.com
lasvegasphonerepairs.com
riselsat.com
myvafterdark.com
whispersystems.net
technicolorday.com
renetextile.xyz
cchcolo.com
professorjoshi.com
capybarashop.com
alfredoreyessci.com
w124blog.com
vdsdev77.com
helloentepriseg1.com
denlab.net
triviamillionairewin.com
jelofly.com
09m370uz.xyz
reple-top2.com
riosgames.xyz
teaberryadvisors.com
satgerv.online
galenika.net
landspeedlogistics.com
familiesgivinghope.com
moisuhop-channel.xyz
chambres-d-hotes-marrakech.com
realizefinanceirorennerr.com
playthemove.info
Targets
-
-
Target
Energypac Pty. Ltd.doc
-
Size
11KB
-
MD5
d3fe6624b0f044affcbd0ef54f646ec8
-
SHA1
2df87a6549c40d6492548e91180c417849557b8d
-
SHA256
fe17e03a00c4aee4bb8daa8507c1b9bc88a28f3f7c53f10f064a8dbbe7b3dc96
-
SHA512
5697394a1c40866fcfef79591f31247997f867942ee63553d892ad23f5928a429e133d2490f774acbd9580391071f53933f5833955a8dccf2a98a20462196b04
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-