Resubmissions
11-11-2023 08:23
231111-j96bfacf5s 1008-11-2023 14:52
231108-r8x8facc5z 1027-10-2023 03:52
231027-ee6lhabh8x 1027-10-2023 03:51
231027-ee1p9abh8s 1025-10-2023 10:35
231025-mm3htagf6y 1023-10-2023 09:11
231023-k5l8fahc84 1021-10-2023 11:53
231021-n2kf8aga32 1021-10-2023 11:26
231021-njywwsfg64 1020-10-2023 21:27
231020-1a8qysbe9t 10General
-
Target
a.exe
-
Size
5KB
-
Sample
230624-1v4mqscd77
-
MD5
800a6337b0b38274efe64875d15f70c5
-
SHA1
6b0858c5f9a2e2b5980aac05749e3d6664a60870
-
SHA256
76a7490d3f1b0685f60a417d1c9cf96927b473825a914221f092f82ea112b571
-
SHA512
bf337140044a4674d69f7a2db30389e248593a99826c8731bc0a5ac71e46819eb539d8c7cbeab48108310359f5604e02e3bd64f17d9fdd380b574f329543645e
-
SSDEEP
48:6O/tGt28lK9iqmcfaFXfkeLJhyPFlWa8tYb/INV/cpwOulavTqXSfbNtm:j/IUiqtaJkeqDUt5xcpmsvNzNt
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win10-20230621-en
Malware Config
Extracted
https://sungeomatics.com/css/colors/debug2.ps1
Extracted
Protocol: smtp- Host:
smtpm.csloxinfo.com - Port:
587 - Username:
[email protected] - Password:
Smr20007
Extracted
amadey
3.84
109.206.241.33/9bDc8sQ/index.php
Extracted
amadey
3.83
45.9.74.80/0bjdn2Z/index.php
Extracted
smokeloader
pub1
Extracted
smokeloader
pub5
Extracted
formbook
4.1
k2l0
thaomocquysonla.click
everblue-scr.com
yifangwuliu.top
zmrwe.buzz
xiaodong6.xyz
apartmentsforrent-gb-tok.bond
mtproductions.xyz
yattaya.com
thetastyfoodguide.com
gulfcoastclubfishing.com
capitalrepros.com
sonetpl.com
amenallelulia.com
shafanavn.com
1ywab.com
getflooringservices.today
quanhuipeng.com
tinytribecollective.com
mollyandpat.com
280175053.xyz
soundpopaudio.com
alltiett.net
sanctuary-for-the-arts.com
atsttoneworks.com
pueblo.app
32qtp.live
aowpce.site
dileijiancai.com
lunggear.com
asouthpacificmemoir.com
ab-hy22.xyz
colineverall.com
cetmetalprefabrik.com
baksis.press
mvpssweepstakes.com
mobilemoneyvideo.com
bobrik-elektro.com
snynlim.store
ezkiosystem.com
ariannabdance.com
villa-istanbul.com
worldassestsledger.com
usdrub.com
bloomingbliss.site
trwc.online
1xboro7.click
unforgettableai.com
tryfastleanpronow.online
sugarloved.com
turcomedical.com
a9hz.trade
scopegaming.com
zhujiangceramics.com
youonpurpose.coach
adhika.online
thevaultfinance.shop
hnmdzx.com
tameniee.xyz
aldimerencasa.com
nqwfnexufr.top
brawnyemail.site
copadconsulting.com
kidslikethat.com
scripturewraps.com
b8q9h.fun
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Extracted
formbook
4.1
sy18
mgn4.com
gemellebeauty.com
emj2x.top
melissamcduffee.com
holangman.top
cqmksw.com
pinax.info
u2sr03.shop
weighing.xyz
jetcasinosite-official6.top
xyz.ngo
suandoc.xyz
aboutwean.site
stockprob.com
bawdydesignz.com
buddybooster.net
scuderiaexotics.com
design-de-interiores.wiki
shipsmartstore.com
patricklloydrunning.com
centrelink.online
grav2.com
myctoclub.com
11elvnphotography.com
immersionbusiness.com
expressshoope.online
xvngitnsfbtjregw.xyz
15wpg.live
1hgfrdr.asia
mycravingscafe.com
123zap.net
zakhtive.com
futuretechsolutions.site
myhc360.com
terapiavisualaeronautica.com
klnaigptapp67.com
bjuice.vip
nanjingyunmi.work
inspiration-note.com
nuaar.com
nappenydelshop.com
tanglewoodbybci.com
goqyfriy.com
garderlafoi.com
drops-of-awesome.com
illuminatonightlyrental.com
moobileproctor.com
gracefulbeautycompany.com
futuretechpros.space
safeborderpetition.com
ltnmgt.com
recursiveinscription.com
homehealthcareoftampa.com
sarjanateknik.com
vonfidans.com
mmrmr.com
77121144.email
squallo.group
sigiprojects.com
swfpic.com
petfurevernz.com
financialfashionista.com
support-dsney.info
speakerbluetooth.com
dbszdjh.fun
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
Extracted
smokeloader
up3
Targets
-
-
Target
a.exe
-
Size
5KB
-
MD5
800a6337b0b38274efe64875d15f70c5
-
SHA1
6b0858c5f9a2e2b5980aac05749e3d6664a60870
-
SHA256
76a7490d3f1b0685f60a417d1c9cf96927b473825a914221f092f82ea112b571
-
SHA512
bf337140044a4674d69f7a2db30389e248593a99826c8731bc0a5ac71e46819eb539d8c7cbeab48108310359f5604e02e3bd64f17d9fdd380b574f329543645e
-
SSDEEP
48:6O/tGt28lK9iqmcfaFXfkeLJhyPFlWa8tYb/INV/cpwOulavTqXSfbNtm:j/IUiqtaJkeqDUt5xcpmsvNzNt
-
Detect Fabookie payload
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Formbook payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-