General
-
Target
DHL Invoice JEDR001193478.xls
-
Size
1.3MB
-
Sample
230328-g15mfahc86
-
MD5
fda7cc3767b509751d3c14700c9bbf66
-
SHA1
3f2a9ae3c98ab30f27a37e6515de4475471812f9
-
SHA256
dc81b5b7a452a87fb69375b84afaeebd797411b314f5c8422dfa0d180226b354
-
SHA512
b7476ae3fb8072cf33b2a0686febec558e5b40794c5a8d1462f6cefbacafd6170a177299840b2e02e1ae349ff068191c286333ddeb2ddac659d0c66ac2a5a7b2
-
SSDEEP
24576:ILKWSSMMednEhakAmmjmCakAmmjmt+MXUjakAmmjmT+MXUYP+222222222222228:ILKaMCaaoxaaoa+MXoaao4+MXC01tc
Static task
static1
Behavioral task
behavioral1
Sample
DHL Invoice JEDR001193478.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DHL Invoice JEDR001193478.xls
Resource
win10v2004-20230220-en
Malware Config
Extracted
formbook
4.1
ar73
classgorilla.com
b6817.com
1wwuwa.top
dgslimited.africa
deepwaterships.com
hkshshoptw.shop
hurricanevalleyatvjamboree.com
ckpconsulting.com
laojiangmath.com
authenticityhacking.com
family-doctor-53205.com
investinstgeorgeut.com
lithoearthsolution.africa
quickhealcareltd.co.uk
delightkgrillw.top
freezeclosettoilet.com
coo1star.com
gemgamut.com
enrichednetworksolutions.com
betterbeeclean.com
kbmstr.com
colorusainc.com
five-dollar-meals.com
baozhuang8.com
la-home-service.com
innovantexclusive.com
chateaudevillars.co.uk
echadholisticbar.com
naijacarprices.africa
4652.voto
kraftheonz.com
ingrambaby.com
braeunungsoel.ch
sweetcariadgifts.co.uk
kui693.com
akatov-top.ru
epollresearch.online
cupandsaucybooks.com
arredobagno.club
gt.sale
dskincare.com
cursosemcasa.site
leaf-spa.net
deathbeforedeceit.com
azvvs.com
laptops-39165.com
ccwt.vip
011965.com
mtevz.online
jacksontcpassettlement.com
aldeajerusalen.com
kellnovaglobalfood.info
alphametatek.online
lcssthh.com
dumelogold9ja.africa
d-storic.com
mogi.africa
ghostt.net
aksharsigns.online
goglucofort.com
b708.com
controlplus.systems
lightandstory.info
invstcai.sbs
2348x.com
Targets
-
-
Target
DHL Invoice JEDR001193478.xls
-
Size
1.3MB
-
MD5
fda7cc3767b509751d3c14700c9bbf66
-
SHA1
3f2a9ae3c98ab30f27a37e6515de4475471812f9
-
SHA256
dc81b5b7a452a87fb69375b84afaeebd797411b314f5c8422dfa0d180226b354
-
SHA512
b7476ae3fb8072cf33b2a0686febec558e5b40794c5a8d1462f6cefbacafd6170a177299840b2e02e1ae349ff068191c286333ddeb2ddac659d0c66ac2a5a7b2
-
SSDEEP
24576:ILKWSSMMednEhakAmmjmCakAmmjmt+MXUjakAmmjmT+MXUYP+222222222222228:ILKaMCaaoxaaoa+MXoaao4+MXC01tc
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-