General
-
Target
Epludok.exe
-
Size
760KB
-
Sample
220304-vd6swahafl
-
MD5
44d3e3a2192ac3389703aa8dd76cc2a4
-
SHA1
c804473e0d109785e6684190406657322e14b79b
-
SHA256
4f227641cdcdea06d222012087bfc21a3eb4bf62ffaac2990e2f01bf0ec62809
-
SHA512
ba31417ea20644ab29a62723db058ef2a3f3f2ddc340b69505e73beed1b2c26234ffd3175f1b70882e95b072523747ffad0daeb4c34eb3400df99e09d8910f3f
Static task
static1
Behavioral task
behavioral1
Sample
Epludok.exe
Resource
win7-20220223-en
Malware Config
Extracted
formbook
4.1
3nop
videohm.com
panache-rose.com
alnooncars-kw.com
trueblue2u.com
brussels-cafe.com
ip2c.net
influenzerr.com
rbcoq.com
zzful.com
drainthe.com
sumaholesson.com
cursosaprovados.com
genotecinc.com
dbrulhart.com
theapiarystudios.com
kensyu-kan.com
dkku88.com
tikhyper.com
aztecnort.com
homebrim.com
infinitilamp.com
leelegantflower.com
floor-space.investments
vidasustentavel.online
wholehearteddaughters.com
vipandeep.com
mdwovzrrm.icu
592215.com
academicplumbing.com
bestveganbook.com
theservantleader.com
nazarickdeveloper.xyz
delta-wing.com
girlfriendsgarb.com
sezyz11.com
ca3construction.com
smartswitchhomeloan.net
luckytwo.agency
ministry-of-barbers.com
babbageacademy.com
informationside.com
packapp.net
spacecoasthondaevent.com
thehealthyimmunereset.com
pjcavaliere.info
trebdurham.com
zhixintonghe.com
gon2580.com
dottproject.net
snakby.com
keeponsports.com
debbiewilsondesigns.com
stagingsolutionsgroup.com
forummondialdelamerbizerte.com
garnier.red
tempestchs.com
zpxinxi.com
jam-nins.com
inclusiocg.com
msmenders.com
whachupichu.com
pursemore.com
thebusinessfitclub.com
scootgotti.com
jakesplacebarbers.com
Targets
-
-
Target
Epludok.exe
-
Size
760KB
-
MD5
44d3e3a2192ac3389703aa8dd76cc2a4
-
SHA1
c804473e0d109785e6684190406657322e14b79b
-
SHA256
4f227641cdcdea06d222012087bfc21a3eb4bf62ffaac2990e2f01bf0ec62809
-
SHA512
ba31417ea20644ab29a62723db058ef2a3f3f2ddc340b69505e73beed1b2c26234ffd3175f1b70882e95b072523747ffad0daeb4c34eb3400df99e09d8910f3f
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-