General
-
Target
d226a2f9eb4ac11314978a2f766387cdd8bef3ab422b33795e383598c4e9f96a
-
Size
256KB
-
Sample
220521-nqrq6ahbdk
-
MD5
91c7ed04f7cc1b8d29673fc66aa71e20
-
SHA1
f412b5ad356c62d190f2d95ffaf7f15ca881489b
-
SHA256
d226a2f9eb4ac11314978a2f766387cdd8bef3ab422b33795e383598c4e9f96a
-
SHA512
e40e603f321860a46de133f82f9e7f0bb5afdea070e64a84e974a7c659c12beef9936f88bd07710a1c17ffff9523a8cd6485fc61ed9b5d5261c7d310bc326993
Behavioral task
behavioral1
Sample
01308.exe
Resource
win7-20220414-en
Malware Config
Extracted
formbook
4.1
dmr
thietkewebngay.com
fdgre.com
silverbuzzer.com
d55105.com
ccc693.com
diptya.net
oleasalon.com
vjvtjkic.biz
edmsociety.com
siyahmaske.win
lmnp-occasion.com
platocosmos.com
fakua.top
albertabarricade.com
kakaninrecipes.com
bestsmokeapp.com
hotelsitaly.online
brewtopiaapp.com
1q1twoother.men
wwwmaharashtratimes.com
daskfjsdkxc.com
duplex-id.com
ppobku.com
swiyke.download
chicagolandfamilylaw.com
fantiaodan.com
lety-club.com
boredofbooze.com
sunlivetv.com
brooke-and-josh.com
thewritesteps.com
german-sniper.com
shiltawi.com
aracaju.online
amyhdia.com
guitronwedding.com
woofoody.com
imagingnetworkri.net
cheztour.com
salesmako.com
polso-indo.com
jq58tz.com
feathergoddess.com
my-havas.com
saledicomacchio.com
cleapeed.com
servicefirstsvc.com
vakkeel.net
molliegold.com
reminder-con.com
greenleap.men
agasy.net
easyants.com
marxedthelabel.com
discoverfanfiction.com
castlemanage.com
dhzzyy.net
rooster-money.com
125lembi.com
rhineze.com
donebymidnight.com
lzjpg.com
seattletowncarservicellc.com
medef-accelerateur.com
funpexw.com
Targets
-
-
Target
01308.exe
-
Size
474KB
-
MD5
25a53b5fdbe19e341d674b816175d4c9
-
SHA1
94d9ad37e73e089eaa967ab433351992a3aee500
-
SHA256
d5231355835fc25fb6f9923639331084ff0ae602929793c263e01eda38d2fa1b
-
SHA512
baf0f1b5e7454e99485be3a16dd5d19cdde08f71bebf596f854cb0c1a89d640de23caa777cae96bba22ededc587dae9814794f6fc4b0ce8ff9f921d67aaaf59c
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-