General
-
Target
12c87026c144f87df2338e40f2293b19.bin
-
Size
1021KB
-
Sample
230310-bgbblacg61
-
MD5
d6582b7af79faee1320bbea9d96900ae
-
SHA1
99461daa5d2c78d0f42ac1ce25f3d8819cb28623
-
SHA256
05eeec0a0a58bada9141dfac90dccc31cd24d7919fc6f729647dfd35629cc5f8
-
SHA512
2ff8e62121e5fba9f266196f952bbd6392711b7ec7710029f3472e9a171692520cbce18b86309f0057ffb93a3e593c0442e8ffb1f4104ac2047f85d3f3c5ff87
-
SSDEEP
24576:1y0uMaFyKncOZZ3cP2Rs1KsmhCoOf5+qhVFoTod:1yHM++Or38VKQDR+OoTU
Static task
static1
Behavioral task
behavioral1
Sample
2678ea9a98659545592b7982a17a1b65b92f0fba7eea9d15760f2dbcb7546956.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2678ea9a98659545592b7982a17a1b65b92f0fba7eea9d15760f2dbcb7546956.xls
Resource
win10v2004-20230220-en
Malware Config
Extracted
formbook
4.1
g2fg
snowcrash.website
pointman.us
newheartvalve.care
drandl.com
sandspringsramblers.com
programagubernamental.online
boja.us
mvrsnike.com
mentallyillmotherhood.com
facom.us
programagubernamental.store
izivente.com
roller-v.fr
amazonbioactives.com
metaverseapple.xyz
5gt-mobilevsverizon.com
gtwebsolutions.co
scottdunn.life
usdp.trade
pikmin.run
cardano-dogs.com
bf2hgfy.xyz
teslafoot.com
rubertquintana.com
wellsfargroewards.com
santel.us
couponatonline.com
theunitedhomeland.com
pmstnly.com
strlocal.com
shelleysmucker.com
youser.online
emansdesign.com
usnikeshoesbot.top
starfish.press
scotwork.us
metamorgana.com
onyxbx.net
rivas.company
firstcoastalfb.com
onpurposetraumainformedcare.com
celimot.xyz
jecunikepemej.rest
lenovolatenightit.com
unitedsterlingcompanyky.com
safety2venture.us
facebookismetanow.com
scottdunn.review
mentallyillmotherhood.com
firstincargo.com
vikavivi.com
investmenofpairs.club
nexans.cloud
farcloud.fr
ivermectinforhumans.quest
5gmalesdf.sbs
majenta.info
6vvvvvwmetam.top
metafirstclass.com
firstcoinnews.com
btcetffutures.online
funinfortmyers.com
mangoirslk.top
metaversebasicprivacy.com
blancheshelley.xyz
Targets
-
-
Target
2678ea9a98659545592b7982a17a1b65b92f0fba7eea9d15760f2dbcb7546956.xls
-
Size
1.2MB
-
MD5
12c87026c144f87df2338e40f2293b19
-
SHA1
b8caf6a6c738f7050523381c4e7fcbba08ec6433
-
SHA256
2678ea9a98659545592b7982a17a1b65b92f0fba7eea9d15760f2dbcb7546956
-
SHA512
b7ea848f6140b81ca8f1a7d9b8f6f6710f709f5289a3bfe707de04416b8b155b6d3afcd3c7d8ce7774903842bbd94a112481d9a3e8bd83b17b1e7616ae2e288c
-
SSDEEP
24576:QLKrBwtHlx7WQmmav30xJB48tHlxGWQmmav30xF6FIW60z0tUo4QcZRx:QLKro7aQmmQ30D2S77QmmQ30H6Q+Qif
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-