General
-
Target
87cfe92ace5f79ca092a7e9b60a0cdcc4776f8583bf2ff70a8461246d6a71687
-
Size
641KB
-
Sample
220521-c272qsehc5
-
MD5
df50bf84acc2a636df39f42730e2a6bf
-
SHA1
10053436616c0a6fd3853f0fe8d3d2ed089da011
-
SHA256
87cfe92ace5f79ca092a7e9b60a0cdcc4776f8583bf2ff70a8461246d6a71687
-
SHA512
d2b746ee1192bbe48af66651680a295494f7083e6e2c9db2ca0eae781b7979a526b632ffa69f3419fb1873faf7a07904eb0f99f895bcc8ca75dd7ac38b863d5a
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
QUOTATION.exe
-
Size
810KB
-
MD5
f516dea583b4b0f7fcb8d6dd89699f78
-
SHA1
a7e60518cf65022b9ce54993ba40bca09b3a024c
-
SHA256
2f1b95fb8123decdb56781dc245603e02ff9a1d2c2962d51fab3946712059a0a
-
SHA512
d079db285753c2b74f4c2520042f2857a4523c8551da6dcad0ff5e02c28348585cf7ee126b0772977faf89fd4de0bf7cd3c96fea7a5069a5ef3d810df1147b92
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload
-
Adds policy Run key to start application
-
Deletes itself
-
Suspicious use of SetThreadContext
-