General
-
Target
ΠΑΡΑΚΟΛΟΥΘΗΣΗ ΔΕΜΑΤΩΝ DHL.exe
-
Size
497KB
-
Sample
230712-g4b5asdb7s
-
MD5
cad1eb405fa1ac324c712c9090e0c08f
-
SHA1
7497b8c739994f003d248b8bd2a62d526c1b902d
-
SHA256
7a55e4b3f800275bc0f7c00cd337d0dd83379ef845fce3fa55b86d68092c1b9c
-
SHA512
0ed96fb9c3ceb1238d4ea26b206ef22e1aba01b8bf48b3d1074a1411e59db2393373f1c6cfca3dedd8e9b325f8af0dd31a6db6462ba3f79db8600a44cb83a6cf
-
SSDEEP
12288:sC3+YT7k0PwTrVg0iTYYXQZbnnTOnVm4j5VyP+:sa+YHL41ghXA9iVm4j5M+
Static task
static1
Behavioral task
behavioral1
Sample
ΠΑΡΑΚΟΛΟΥΘΗΣΗ ΔΕΜΑΤΩΝ DHL.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ΠΑΡΑΚΟΛΟΥΘΗΣΗ ΔΕΜΑΤΩΝ DHL.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
formbook
4.1
il09
ahy99.com
tmzrygdv.cfd
trainingwithoutnerves.com
loaddirecters.com
elocquinn.com
sunnahscents.com
jogobrgames.xyz
skinkissedaesthetics.com
943465722.xyz
jopkrrub.cfd
kavrex.com
sensori.host
sybrstrmtdiyari.com
ourouba22.app
smilebrandsbreacsettlement.com
72um.asia
kenleyeventdesign.com
mandalastudioonline.com
much2more.com
beckettbees.com
wjpeukam.cfd
metaol.xyz
euxlbiip.cfd
mathiseninvesting.com
lastsecondlebanon.com
lmtumvld.cfd
wvbtuher.cfd
chasonreg.com
sebringcleaner.com
dotphysicalirving.com
petaura.store
bnreurtz.cfd
wmdmyzzn.cfd
family-hope.click
1bonusyakala.xyz
rushleggings.com
casadamaemariana.com
pinington.online
sslysot.xyz
contenuduck.space
gdaccv.cfd
xn--franciscoconceio-snb5e.com
kvadqllj.cfd
dbdpzlj.cfd
nanostars-ont.com
dream-home.top
fezfxtel.cfd
xn--80aahvh2beehc.com
yqlhnkku.cfd
servatios.com
thicketcontracting.com
techfiai.com
wsmjhvss.cfd
fanf5.xyz
lolfreerpcodes.com
ejaaq.xyz
betnoelgiris.website
locationgitesaintaignan.com
neiwaizhi.com
hailey-design.com
0tr22f.cfd
casalexina.com
yfhrxvci.cfd
nanhai.site
l1c86.top
Targets
-
-
Target
ΠΑΡΑΚΟΛΟΥΘΗΣΗ ΔΕΜΑΤΩΝ DHL.exe
-
Size
497KB
-
MD5
cad1eb405fa1ac324c712c9090e0c08f
-
SHA1
7497b8c739994f003d248b8bd2a62d526c1b902d
-
SHA256
7a55e4b3f800275bc0f7c00cd337d0dd83379ef845fce3fa55b86d68092c1b9c
-
SHA512
0ed96fb9c3ceb1238d4ea26b206ef22e1aba01b8bf48b3d1074a1411e59db2393373f1c6cfca3dedd8e9b325f8af0dd31a6db6462ba3f79db8600a44cb83a6cf
-
SSDEEP
12288:sC3+YT7k0PwTrVg0iTYYXQZbnnTOnVm4j5VyP+:sa+YHL41ghXA9iVm4j5M+
-
Formbook payload
-
Adds policy Run key to start application
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-