General
-
Target
59cac9b1189513625b6c5120705b8b6e82e58ce3be175bba8a21eb95df4fae17
-
Size
880KB
-
Sample
220724-dbmhsacdh8
-
MD5
0ee80d0102f39d5e2a0022711e5af9ff
-
SHA1
6fef626f54a96a7b5525d81391f651ecee824b96
-
SHA256
59cac9b1189513625b6c5120705b8b6e82e58ce3be175bba8a21eb95df4fae17
-
SHA512
717f3cfa4a6a8b357853a668980d7adba7a7b0a2e36cb2b58fd3f88ecb9aee4ed77582ac755f33becd765d314f1f5467b62929c0c97dd2be35ec1e0634ed41ac
Static task
static1
Behavioral task
behavioral1
Sample
59cac9b1189513625b6c5120705b8b6e82e58ce3be175bba8a21eb95df4fae17.exe
Resource
win7-20220718-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.dobigmail.com - Port:
587 - Username:
[email protected] - Password:
Cuscargo123+
Extracted
formbook
3.9
se
ro-organic.com
techjobsmn.net
vandanet.net
huikuaida.com
wenfengbag.com
coolcloudhvac.company
vikenfa.com
espscienceandeducation.com
lianchuangsk.com
xiktv.com
cuncunle.ltd
mycouturelab.com
flexitllc.com
malesco.com
siteiby.com
clonemovie.com
fx-ssc.com
beautyllbeholder.com
setgaraj.com
architectjd.com
zuiqiangshengjixitong.com
mensvitamins3k.com
e-proinfo.com
hqrecipes.com
luktartstudio.com
k5techgroup.com
vnzqwl.info
qomqu.com
insurancemarket.agency
moosikar.com
hotelsriramresidency.com
energy-crown.com
measuringrodproducts.com
almaz.gold
doublescattle.com
wfee.ltd
cat5certified.com
skypehypnotistnyc.com
xhtd43.com
otpbjalky.review
milliremsfpscyd.download
skzhongyi.com
mejorsegurosalud.com
qutui.info
reddoveevents.com
mrnodepositbonus.com
wh2213.com
adsensemart.com
poorhyo.reisen
bus919.com
jjmtim.com
beniesanders.com
tuscanyguide.info
fornasieralessia.com
eejkw.com
happychristmastime.net
lukebray.net
wendydavisconsulting.com
dashanyingshi.com
kelizhealthservices.com
daqing0459.com
armoryhomeinspections.com
oshtecvalet.com
healthfoodclub.info
ntwireds.com
Targets
-
-
Target
59cac9b1189513625b6c5120705b8b6e82e58ce3be175bba8a21eb95df4fae17
-
Size
880KB
-
MD5
0ee80d0102f39d5e2a0022711e5af9ff
-
SHA1
6fef626f54a96a7b5525d81391f651ecee824b96
-
SHA256
59cac9b1189513625b6c5120705b8b6e82e58ce3be175bba8a21eb95df4fae17
-
SHA512
717f3cfa4a6a8b357853a668980d7adba7a7b0a2e36cb2b58fd3f88ecb9aee4ed77582ac755f33becd765d314f1f5467b62929c0c97dd2be35ec1e0634ed41ac
-
Formbook payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-