General
-
Target
JUNEupdatedSOAexe.exe
-
Size
352KB
-
Sample
230704-tg9s9sgg3z
-
MD5
69c2be41eea373b5fd86c88464868064
-
SHA1
af52386882ee00e91425ebce6fb409b36cd49d2c
-
SHA256
ec9d091c881ad4da6f5e77f947c2723b1aa374fbf373931871c767dfb9cabb0e
-
SHA512
b5fe4d6fb8276552a1c16b2ec94341e549401a71645d7ab26b53dc63e20de7201cfa28ab543459951a8f50c2049974533c82083c95c353b1e9ac4ceed41fbbc4
-
SSDEEP
6144:vYa6cmu5R3tS1ZmDoPfLLw6gCeF00DxKzMu+GAPgnYyXy8eBkoxG+o3V6kfm:vYSz5eZmMPfLhEFBszj+GAPeLi8e+6qm
Static task
static1
Behavioral task
behavioral1
Sample
JUNEupdatedSOAexe.exe
Resource
win7-20230621-en
Malware Config
Extracted
formbook
4.1
s28y
whytry.shop
readyconcreto.com
redbudvending.com
prosblogs.com
litescales.sbs
campinglager.beer
serenitysuite.health
starbytescafe.com
youbi.cyou
hg301d.cfd
nissanvideos.com
kedou25.com
relovedresses.com
contourbioinc.com
usrinfo.top
i8ep58.cfd
wildcatcreekhomes.com
mpocash.mobi
shisokj.vip
jiangwan.top
blogdamuskinha.com
investigatorsshows.net
tickeplate.com
copythriller.com
8betkrw.com
sabzevarfaj.sbs
2auw88.com
truyenfullonline.com
comienzadesdecero.com
vg4d0o.work
m-behjati.com
coatedincoco.com
mvp688.pro
wexun.net
lightsoftwear.com
sedashop.com
babyhubstore.com
revolut.expert
blahblahblahkatee.com
configurableba.life
brekroic.com
getwinchance.com
lyrianhealth.com
xn--i2bwwzn.com
gaynorvascones.site
338zt7we6i0.cyou
visual138.info
hieblev.online
86slsz.com
rttty15.com
rewindrehabilitation.com
ordukampanyalar.com
prinicaonlinr.com
farviolet.com
riverwoodschool.com
fascistian.com
probiostarter.com
airrests.com
i9bet.quest
ou3ejf.cfd
newskysupplies.com
hotelguerneville.com
yijgqpi59.top
1d8t.com
ccxx0.com
Targets
-
-
Target
JUNEupdatedSOAexe.exe
-
Size
352KB
-
MD5
69c2be41eea373b5fd86c88464868064
-
SHA1
af52386882ee00e91425ebce6fb409b36cd49d2c
-
SHA256
ec9d091c881ad4da6f5e77f947c2723b1aa374fbf373931871c767dfb9cabb0e
-
SHA512
b5fe4d6fb8276552a1c16b2ec94341e549401a71645d7ab26b53dc63e20de7201cfa28ab543459951a8f50c2049974533c82083c95c353b1e9ac4ceed41fbbc4
-
SSDEEP
6144:vYa6cmu5R3tS1ZmDoPfLLw6gCeF00DxKzMu+GAPgnYyXy8eBkoxG+o3V6kfm:vYSz5eZmMPfLhEFBszj+GAPeLi8e+6qm
-
Formbook payload
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-