General
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.9690.14807.rtf
-
Size
864KB
-
Sample
220926-rhvpmacbhm
-
MD5
027e492f7ceb4cf8023d311602434de3
-
SHA1
5b5a739f5688ce1154a2a4af2de1e9db8854294d
-
SHA256
5ddfcee976daf1f71a8b1f41a4dd170e80683b2e79d48e312d6010f941de148f
-
SHA512
bd63344081b7b35e9519b40744aae0af19e5f0a23472696db4f7dcabf2c45c90dd59ac471512aca438e37934d361afd5a8d72cca4ec483b2083cde7140fb3b5d
-
SSDEEP
1536:kpGEch6dtRGWbCtpl5kmrJ//RFxXxBpzB9TBtiBqK8Qf6YXkY0kY0kY92i3e+6fV:gho
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.9690.14807.rtf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.9690.14807.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
formbook
4.1
n25n
counterblast-stately.net
anhuiluan.xyz
searchscrealestate.com
ipfsvault.com
q2307.com
doingout.com
empyreanaudio.com
defectivehomes.info
intlword.online
costumeking.kiwi
backachersalpacas.com
kellysheros.directory
mtbscecure.net
realestateprogression.com
shengmimama.com
sdftsb.com
ghafouli165.online
effexorbuy.top
flipgrill.store
nevadatechhelp.com
dave-rogers.uk
deannakrueger.online
vahtra.net
kolonline.net
sb-qq.net
videotape.store
storeofhope.info
focuscommunitypublications.com
newslive.online
hoviruoka.club
kuljetusjyvaskyla.net
irascy.top
minank.online
fitness-personal-trainer.net
edmarmy.com
mohand.info
animatronicgopher.com
zbding.com
batminshop.com
334316.com
lonsua.net
figadozero.online
bsfdbgdf.xyz
easydeals24.net
5050coldwatercanyon307.com
nongtakai.com
dream11stars.com
ghty76.site
271m.top
studysols.asia
tipoffapp.xyz
hartshornarboretum.site
afflotto432s.com
gratomi.online
wildwestexcavationllc.com
paydaytampa.net
freebizs.com
eventmidasbuyy.my.id
mutualsolidaridad.com
868352.site
n-psg.com
zykcsj.com
emailsec.tech
ft45.site
boracayislandguide.com
Targets
-
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.9690.14807.rtf
-
Size
864KB
-
MD5
027e492f7ceb4cf8023d311602434de3
-
SHA1
5b5a739f5688ce1154a2a4af2de1e9db8854294d
-
SHA256
5ddfcee976daf1f71a8b1f41a4dd170e80683b2e79d48e312d6010f941de148f
-
SHA512
bd63344081b7b35e9519b40744aae0af19e5f0a23472696db4f7dcabf2c45c90dd59ac471512aca438e37934d361afd5a8d72cca4ec483b2083cde7140fb3b5d
-
SSDEEP
1536:kpGEch6dtRGWbCtpl5kmrJ//RFxXxBpzB9TBtiBqK8Qf6YXkY0kY0kY92i3e+6fV:gho
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Formbook payload
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-