General
-
Target
BID-758472938.doc
-
Size
122KB
-
Sample
230816-gj57msfh96
-
MD5
13a3f6521c13ba0c632db67c7041c977
-
SHA1
5dd8153d6daa7d000fbb5c9c9760bc2f57b27a1c
-
SHA256
409992d0436f5256bc7bf86bbe08d7c41d13103c59f1cfc35885d1608a3e7286
-
SHA512
410fa352b9ae96e604f07c7b1ecd34fe24b6d80fed05cfd2dde6b9e5c5c22a8419a6c7463d7234706dd76f8e6b2de2d44f3a18bd6c5c8286d2decd7373cbc01b
-
SSDEEP
768:vwAbZSibMX9gRWjzAvwVO4xNX027K0zNKiCzaYF4bwvvh1D6:vwAlRsAvH4fX023zv95wvvS
Static task
static1
Behavioral task
behavioral1
Sample
BID-758472938.rtf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
BID-758472938.rtf
Resource
win10v2004-20230703-en
Malware Config
Extracted
formbook
4.1
oy30
rfc234.top
danielcavalari.com
elperegrinocabo.com
aryor.info
surelistening.com
premium-numero-telf.buzz
orlynyml.click
tennislovers-ro.com
holdmytracker.com
eewapay.com
jaimesinstallglass.com
damactrade.net
swapspecialities.com
perfumesrffd.today
salesfactory.pro
supportive-solutions.com
naiol.com
khoyr.com
kalendeargpt44.com
web-tech-spb.store
lodjireal.online
ultraflooringmore.com
iwantbundles.com
theroofer.lat
qwxry.fun
faserfreunde.com
body-for-living.com
welnessfit.com
clublucky.store
nlast.cyou
gkoders.com
okxmttwa.click
nodesofty.com
alemania-paredes.com
travel-insuranceprice.shop
thechaay.com
formulavsupplements.com
gstringtheory.com
ruopenai.com
evi-based.com
danleugers.com
lojinhaevelyn.com
denzaimivsem.buzz
izmn2vd8.click
asliy.top
kawitrack.com
brandiai.com
ssssne.com
asianewsgood.online
proloop.work
dhikaedwina.com
onemarinallc.com
realmpabq.com
boswells.biz
jpxiaoxi.top
ishirink.com
thundershorts.com
rainydayroofs.com
atatra.com
hftroi.xyz
fundamentplus.com
gsvaedpzugtdn.com
mic-reform.info
vacuumbagsuppliers.com
gaoxiba150.com
Targets
-
-
Target
BID-758472938.doc
-
Size
122KB
-
MD5
13a3f6521c13ba0c632db67c7041c977
-
SHA1
5dd8153d6daa7d000fbb5c9c9760bc2f57b27a1c
-
SHA256
409992d0436f5256bc7bf86bbe08d7c41d13103c59f1cfc35885d1608a3e7286
-
SHA512
410fa352b9ae96e604f07c7b1ecd34fe24b6d80fed05cfd2dde6b9e5c5c22a8419a6c7463d7234706dd76f8e6b2de2d44f3a18bd6c5c8286d2decd7373cbc01b
-
SSDEEP
768:vwAbZSibMX9gRWjzAvwVO4xNX027K0zNKiCzaYF4bwvvh1D6:vwAlRsAvH4fX023zv95wvvS
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-