General
-
Target
Stocklist.doc__.rtf
-
Size
1.1MB
-
Sample
221011-kapp3sebeq
-
MD5
bd80accc4a1535d881c3b33d187f1eb5
-
SHA1
e68efac7e694a36e6effa9d4ff5450a9c4b23c90
-
SHA256
f94a50338954420bb77446d6962361193e5cfde7264e4554a64fc38444fc029c
-
SHA512
9e813b58cc26b8f1da4a24b6932f12fdac7326990a4eb7ac0ee0b52b5881c16c84816e020ba140dce32f8a048ee4c8ff60d4bb879a47bd3aa5c08c5b68b92c03
-
SSDEEP
1536:bJ/pGEch6dtRGWbCtpl5kmrJ//RFxXxBpzB9TBtiBqK8Qf6YXkY0kY0kY92i3e+z:FHf
Static task
static1
Behavioral task
behavioral1
Sample
Stocklist.doc__.rtf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Stocklist.doc__.rtf
Resource
win10v2004-20220812-en
Malware Config
Extracted
formbook
4.1
o07o
bestofleak6969.fun
tupigo.net
hsy-ltd.com
stockfraudalerts.net
huelink.net
mode24.shop
monzon-consulting.com
ok184.shop
iamhighvalue.com
nitrosmith.com
28729.top
clovegiftcards.site
heront.online
healthimpactstudio.net
mitdam.com
ultravuelos.com
vip-tehnology.live
yogainbaja.com
adoweb.net
customketodiets.info
xchange.work
nibblesinc.com
bw656jumpc.xyz
truevipsuperappgame.sbs
wisconsinsellsfast.com
thebeardlab.net
just-femme.com
yangfutao.top
fredgoncalves.online
sj6oi3.net
whatwoulddaviddo.store
hastenvertigo.com
zapakujemy.cloud
liderforceacademy.com
careteam.store
srochnouletet.com
sherrysplanthire.africa
btmy108.buzz
alladerpausa.com
speedshopp.net
flexpaas.dev
calcoic.site
barberschair.site
bluebot.cloud
cabincards.site
gffex.net
iim-ss-test.net
navdigi.xyz
maneandmoose.net
deky-grosshandel.xyz
babygirl.store
asplastikmakina.com
inovationpro1507jectc.tech
monkeydorey.com
ky7087.com
bravehorizons.site
green-since2022.com
moreorlessfilm.info
zumuchuanmei.work
sasidharg.com
slaya.top
hoodedstore.xyz
granddaughterration.top
rosegold68.site
euk5h.top
Targets
-
-
Target
Stocklist.doc__.rtf
-
Size
1.1MB
-
MD5
bd80accc4a1535d881c3b33d187f1eb5
-
SHA1
e68efac7e694a36e6effa9d4ff5450a9c4b23c90
-
SHA256
f94a50338954420bb77446d6962361193e5cfde7264e4554a64fc38444fc029c
-
SHA512
9e813b58cc26b8f1da4a24b6932f12fdac7326990a4eb7ac0ee0b52b5881c16c84816e020ba140dce32f8a048ee4c8ff60d4bb879a47bd3aa5c08c5b68b92c03
-
SSDEEP
1536:bJ/pGEch6dtRGWbCtpl5kmrJ//RFxXxBpzB9TBtiBqK8Qf6YXkY0kY0kY92i3e+z:FHf
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Formbook payload
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-