General
-
Target
f201f5ed829e08dbd5ccb40533f26010f5c3e75134fc1da3f9ed56eec6077300
-
Size
237KB
-
Sample
220521-mz6e8scge8
-
MD5
15cdaba40d68b1aaaa46e176b94dd946
-
SHA1
6df51e167bb25b675f0f3b79f2ceb52426ca8292
-
SHA256
f201f5ed829e08dbd5ccb40533f26010f5c3e75134fc1da3f9ed56eec6077300
-
SHA512
8cec8b6392b21fdbb04c061c916c9b296547c3ed7fbb0570052ae4163eef10708a72c170f338245c0dbd76167cb35cdc52b35d7304ab6f523a57f806e60b8fab
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order PO045793 from Voile Trading Co.,Ltd.exe
Resource
win7-20220414-en
Malware Config
Extracted
formbook
4.1
mw9
buyaii.com
zqdhrh.com
essentialsrefined.com
carbo-notifer.biz
cpahitr.com
westerntreasureseo.com
prowrestlingevent.com
hawthornbanksaves.com
vinhomes2.info
atriumindonesia.com
crunchinessretonation.com
masstorthedgefund.com
stroy-staleks.com
chinamarbleandtile.com
tv16878.info
hasegawa-takuma.com
cuxiaomao.com
umhhih.info
ieml.education
mwvllc.com
jaymeandjosh.com
marketer-daily-news.com
promt88.com
chandon.cloud
theworldisyour.com
txidrefnvd.com
flippingcrypto.com
excel-industrial.com
privateblockchain.party
thegodemcee.com
lino.ltd
louiscivitarese.com
blog-a-story.com
profesionalenfermeria.com
megacolorrun.com
discovertellus.com
492oum.info
eqodigital.com
cbdevonshire.com
ilovepura.com
rockychang.com
wrightsy.net
1d1onecome.men
nextdoorgaysex.com
miuyin.com
keieimail.com
coldwarcoldbrew.com
domesticworkload.loan
vadark.com
smgama.com
forever-sa.com
zarceb.site
rocycled.com
bryantaudioproductions.com
txneuqxgsodwteh.com
agrickly.com
86gmail.com
beijingfuxingbangda.com
qifeizuqiu.com
vanguardspark.info
t68w.com
zh7dpu.com
alfaperu.com
jameswjrobinson.net
chilogae.com
Targets
-
-
Target
Purchase order PO045793 from Voile Trading Co.,Ltd.exe
-
Size
320KB
-
MD5
b02fb2439cd88a5e399683f14d6d80ff
-
SHA1
7098d5175626c3bef989a7d0e0344158a752ebc4
-
SHA256
c6bed06259f7c50c2b15e8161d5b1fa11690e69a7e5bb3261202debfb7d96708
-
SHA512
aff2394e671e8f8b33d7bf5a4444590fb53c74a2f6bc29faf3627a467652f0d2d7f1bd22c420bd46621638ff2849c30be265b71ecce89b14f83a4d68b6cf78ba
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Adds policy Run key to start application
-
Deletes itself
-
Suspicious use of SetThreadContext
-