General
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.29632.17941.rtf
-
Size
265KB
-
Sample
231102-g1191sac47
-
MD5
1982efd383b4f28fafb917132b87478e
-
SHA1
6cca35d8bc2430bdf715696aece16ca34199f418
-
SHA256
1e7026039a8201b0d0ef23a2cb837fbde785f4e0895e843ec04c975d60afb99f
-
SHA512
95e75edeec94d59fc9eee3e17866e859f23448a7fe2e21039b14342455be8f2daa4bae60aca0ddb658a7492a811237ade1b433a242c8159d6c4918870a2a1fbb
-
SSDEEP
768:YwAbZSibMX9gRWj2plPRMz1tL7QZiWuuSJCUXo75:YwAlRTeB9MMWCCUXo
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.29632.17941.rtf
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.29632.17941.rtf
Resource
win10v2004-20231023-en
Malware Config
Extracted
formbook
4.1
o5gu
jonathanvuportfolio.website
moneyboost.net
imikecutyou.com
toollessassembling.com
keoinfra.com
mackenziejamesphoto.com
zenovaa.com
ngmnetwork.com
odropoficial.com
huyangli.company
ganjajuice.info
promptmechanic.xyz
crispyjoy.com
dinevintageshirts.com
heyxop.online
hopefinancialmarketingph.com
weeklyvolcano.app
consultoriopmn.com
seetheratequote.com
ftds77.com
neuepilates.com
akaegostudios.com
solhealthglobal.com
edelweiss45.online
getalign.info
playermaveric.click
osuszdom.com
eastern-prime.com
4zc.lat
ssongg3888.cfd
polar-tours.com
herbahis239.com
funeral-services.com
chawlaaluminium.com
aintrepreneurship.com
chiefsuppliesllc.com
easyhub.xyz
umaylek.site
menofthehouse.store
11cmace.vip
mostbet-wcx4.top
robbiexgeorgie.com
elliotlakefield.com
marcjacobssalecanada.com
barbiealien.com
mcfeeinsurance.com
hk-newbie.com
sportscolorslove.com
zabarofficial.com
seva.fund
lion-sales.com
jebwallet.app
appsrocky.top
viruceaseusa.com
aaronlea.design
lyftpassengerslawyers.com
defiacquisition.com
iuzswq.top
acreeksis.online
rkautomationservice.com
pkn910.com
sykdnxjxbyu.xyz
hegre-shaved-girls.com
scentwithluv.com
felix-froehlich.com
Targets
-
-
Target
SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.29632.17941.rtf
-
Size
265KB
-
MD5
1982efd383b4f28fafb917132b87478e
-
SHA1
6cca35d8bc2430bdf715696aece16ca34199f418
-
SHA256
1e7026039a8201b0d0ef23a2cb837fbde785f4e0895e843ec04c975d60afb99f
-
SHA512
95e75edeec94d59fc9eee3e17866e859f23448a7fe2e21039b14342455be8f2daa4bae60aca0ddb658a7492a811237ade1b433a242c8159d6c4918870a2a1fbb
-
SSDEEP
768:YwAbZSibMX9gRWj2plPRMz1tL7QZiWuuSJCUXo75:YwAlRTeB9MMWCCUXo
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-