General
-
Target
SecuriteInfo.com.Exploit.CVE-2018-0798.4.23649.15924.rtf
-
Size
3KB
-
Sample
221209-qsynladc45
-
MD5
69a6f3e5b30ab64fd90eb46dfec8d714
-
SHA1
9843c366b075bc145a5164be19052f8b441ef6e8
-
SHA256
5bf7aa1de7a064a956a29b7927a17b58c20b7cba96d74bd976ff920c41a34224
-
SHA512
547a9d9d80dcc33e0b113028b9a6fc8447d2823dbef89e01412282ce1f02317cd65bf48c2cfc2abd5d9b73ac49d07a8cd2860626675f7857ac906bf1b12c5bcd
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.CVE-2018-0798.4.23649.15924.rtf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.CVE-2018-0798.4.23649.15924.rtf
Resource
win10v2004-20220901-en
Malware Config
Extracted
formbook
4.1
lt63
fortrantelecom.africa
ffafa.buzz
bullybrain.com
ekeisolutions.com
lamiamira.com
noahsark.xyz
beautyby-eve.com
cloudfatory.com
12443.football
hataykultur.online
donqu3.sexy
breakthroughaustralia.com
havengpe.com
cpxlocatup.info
corefourpartners.com
amonefintech.com
thithombo.africa
bassmaty.store
fdshdsr.top
lifesoapsimple.com
divaproportugal.com
footwearbags.com
ivbusinessservices.com
93215.vip
livescorenona123.online
ablulu109.xyz
chuyunfang.com
fogofwar.quest
weimingpian.net
getmowico.com
hability.xyz
brightmachineary.com
precious-sawdaa.com
nochewing.net
fruihcon.xyz
hue-fame.com
egordizain.ru
tutastrading.africa
deansroofingandconstruction.com
arabianroadstech.com
family-doctor-41501.com
233969.com
9898svip1.com
yonggunkim.net
illminded.com
gemlikguventasevdeneve.com
fiberlazertamir.com
kimia.boo
skinnectar.uk
leve-tech.co.uk
just3pages.com
wristnoe.co.uk
e-suxiu.com
evri-deiivery.com
storageredbox.net
grdpy.com
darkblissclothing.com
functionful.com
bestinvestorcorporation.info
com-prostaclear.com
91yqm.com
districthvacs.com
floridasoftware.biz
cocredcaixaaqui.com
gooqoo.xyz
Targets
-
-
Target
SecuriteInfo.com.Exploit.CVE-2018-0798.4.23649.15924.rtf
-
Size
3KB
-
MD5
69a6f3e5b30ab64fd90eb46dfec8d714
-
SHA1
9843c366b075bc145a5164be19052f8b441ef6e8
-
SHA256
5bf7aa1de7a064a956a29b7927a17b58c20b7cba96d74bd976ff920c41a34224
-
SHA512
547a9d9d80dcc33e0b113028b9a6fc8447d2823dbef89e01412282ce1f02317cd65bf48c2cfc2abd5d9b73ac49d07a8cd2860626675f7857ac906bf1b12c5bcd
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-