General
-
Target
Samples.doc
-
Size
11KB
-
Sample
220926-lgc6asbebn
-
MD5
bd0fc8c16b9edecf1c96615d618b5d8a
-
SHA1
1d86cfb479d59aa231dea6c39e4e4be93d2f6ef7
-
SHA256
7c12c16cc778599d1ab51364a58b918ec66186ae0c001f70802c6fa067512ffd
-
SHA512
1c91f70b04693dd1d9b9f69bbe0716a013427a9db36a4ee4be94677076b0e3a20a14786ebeb79d917aa07e3f2bbb44341565ab87f9aafccfdf6be1120046644e
-
SSDEEP
96:gNIN6gD/52yCtUjTn8nEt1g8Y7380ehNQP6X5JkHF1hfA0X4HXGgWMU2rFc5g7Zc:mgh2yjjT8EtW3TA04iWJc5g7pV3PCDZR
Static task
static1
Behavioral task
behavioral1
Sample
Samples.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Samples.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
formbook
dmpz
g6nVYcuLqoVCBunEXBXJ6w3fWQ==
ZcvMXCXftOLl
7llPyUdY6SDW+0jFjBhH6w3fWQ==
oNlI65OL5t6RGejebRdKsAjXGtsK8A==
kU64X5biR3AzyCEnlw==
dHWevaYxywS6e4PXkxhTtP/UGtsK8A==
tucfwSpD6EgygeItq7/COFAbH9E=
tSbx9dJa7CjaS9i1c3d4ImUJ
IlWSNsSPqt6mcQ3d
e0GDBU2jsOzL5OKBIzg=
N83IzuJUqu7g3+KBIzg=
nbC4xt55DmBKL0xV4GLW6w3fWQ==
Tk99naENrAzQj1piGbcl
6043tio61grD5OKBIzg=
HvXh6PMok+vZE1qjJUJClgSk+PAr1skh
JDtEXxkexjYzc+Bwc3Yt
sl+jPuCtSKWIyeKBIzg=
+eXvDCFojnwd9P79cBrQ6w3fWQ==
UfksRCdag5cHMXc=
7OW2uH1YngQA92VbLtpaRLmO/5JOL6k=
Z0k0ODnCBlNh9L25eoBQQKiC2XqFWLQ=
enR3jkAaX7q82uKBIzg=
5KzjT+4Gm+/kXehwc3Yt
zNgNMR9UgGUjaBYLrFLc6w3fWQ==
Hus5X18zWyDy
s6SgsLVB2z9FTJMQvQ25Jnc=
3Gdi5GJ5EWhTtXx1PJhBHA==
rUt8djH/GAPH5eKBIzg=
KUmPxmZh+iPpK3S/R7PtQlAbH9E=
BaKx4Jlqh5cHMXc=
842Jh4jV+CUZ5a2UN894ImUJ
hUnAYPQQX00NWeK/ew+DfMmpCLEfuns0YQ==
PMH2mQIeZ5yesguWhHtDCw==
oqXgJNHYIw7N7hMaFZAEHHE=
aTNm3BdkeVrtQLmFiFMH3xOb5M/P5A==
vjMxtTf3FvWrT07AnCrM6w3fWQ==
a50LuPV2EzzqjmdtKtJ4ImUJ
wekmPyanOGwTwq1wc3Yt
10E2wU8GIhfWRFUqnQ==
ELbHPsqU5Y9kJ2A=
eAcpK+DuxaRPYXZA+SE=
xB0+8GZxym5JgNMyyg25Jnc=
8asRpkxs/WFLWBTc
+zBdZ4ZNteDL+NTC
Xk43JQuI8iUT9uKBIzg=
76Tb9+yL2dCSQEmtW3Jw0z4sNREO
nu9ihjtBknwuR2e1XH94ImUJ
u2ivm9+s+TQ=
96LbB/6TM4mKm8IhPJhBHA==
IUmJnoIQphuaZg==
oESPQbH8DPuQbDPctOfYOVw7stAM+6s=
y+cpSkSGm8iLnuKBIzg=
hqflbsVWpYw/2q1wc3Yt
ixwhmhoryDgqhhelhHtDCw==
D1TH7w6l/q6XUFF/ks3VTac/vIrSuEIp
7nNsADB1kG0wyCEnlw==
RameMNKo82ZZn00CzXKmFA==
wwRCzzZB7FpWvUw7IEkM+kssNREO
F1HOEfmEE21dHg0aFZAEHHE=
S2BlY1v0Py75n2AwmB5F6w3fWQ==
xFndOHgzWyDy
OsP8mvsKn8uNonf1pnQr
ZX2WVrvGYMymcQ3d
H0qJKatulHQ0yCEnlw==
anastasiavekselis.com
Targets
-
-
Target
Samples.doc
-
Size
11KB
-
MD5
bd0fc8c16b9edecf1c96615d618b5d8a
-
SHA1
1d86cfb479d59aa231dea6c39e4e4be93d2f6ef7
-
SHA256
7c12c16cc778599d1ab51364a58b918ec66186ae0c001f70802c6fa067512ffd
-
SHA512
1c91f70b04693dd1d9b9f69bbe0716a013427a9db36a4ee4be94677076b0e3a20a14786ebeb79d917aa07e3f2bbb44341565ab87f9aafccfdf6be1120046644e
-
SSDEEP
96:gNIN6gD/52yCtUjTn8nEt1g8Y7380ehNQP6X5JkHF1hfA0X4HXGgWMU2rFc5g7Zc:mgh2yjjT8EtW3TA04iWJc5g7pV3PCDZR
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-