Resubmissions
29/07/2024, 15:14
240729-sma2fsycrf 10General
-
Target
PAYMENT SLIP2.doc
-
Size
705KB
-
Sample
240729-sma2fsycrf
-
MD5
57f3a8024f22620c786a65d06583a3e9
-
SHA1
0a172545f65de6d7b0478fcda55b2c8d0bebe915
-
SHA256
f8075ee649626473c5452ffdc4330597d1988e8a22367162406c658af617e4de
-
SHA512
94b29ac4017509812eb47cb654cc00a06cd1232fe8ada550e91373276e2b540321b7e896213c88f05ed5b637af27aa5c604fdc0cdd62fcf2ef841f75847b38b3
-
SSDEEP
6144:n62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62Y:EUm5
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT SLIP2.rtf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
PAYMENT SLIP2.rtf
Resource
win10v2004-20240709-en
Malware Config
Extracted
formbook
4.1
oi12
exobello.bio
boinga.xyz
animasriversurf.com
gamesflashg.com
hayatbagievleri.online
washington-living.com
july7.store
x-pod-technologies.com
farmhouseflaire.com
qb52aa.top
datasynthing.xyz
5v28n.rest
legacycommerceltd.com
mundodelosjuguetes.com
wjblades.com
z9b6g8.com
eskimotech.net
dreziuy.xyz
bestsolarcompanies.services
vertemisconsulting.com
rockinrioviagogo.com
acimed.net
tdrfwb.shop
xd4tp.top
bihungoreng19.click
tcnhbv301y.top
triumphbusinessconsultancy.com
menuconfig.store
seikoubento.com
defiram.com
bespokearomatics.com
yellprint.com
flickeringlc.christmas
aidiagnostics.xyz
ok66g.app
z3o6i8.com
dacoylomarkemilcajes.online
rummymeett.xyz
arazivearsa.xyz
crystalpalaces.store
qtsandbox.com
wkbbb.com
abusedcode.com
puzzle-escape.info
jagoboss.com
seguro-pagamento.life
luxindicator.site
mxtp.coffee
okumafishing.xyz
gaffelshop.shop
optimusgs.com
qtsandbox.com
bt365332.com
kernphoto.art
p0uhx.pro
agsaydinlatma.online
korbidholdings.net
nsservicescorp.com
healthcare-trends-22748.bond
xtraslot.link
travelblitarjuandabmtrans.com
linlinda.com
gnonhcav.xyz
05544.xyz
selalujadipemenang.com
Targets
-
-
Target
PAYMENT SLIP2.doc
-
Size
705KB
-
MD5
57f3a8024f22620c786a65d06583a3e9
-
SHA1
0a172545f65de6d7b0478fcda55b2c8d0bebe915
-
SHA256
f8075ee649626473c5452ffdc4330597d1988e8a22367162406c658af617e4de
-
SHA512
94b29ac4017509812eb47cb654cc00a06cd1232fe8ada550e91373276e2b540321b7e896213c88f05ed5b637af27aa5c604fdc0cdd62fcf2ef841f75847b38b3
-
SSDEEP
6144:n62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62W62Y:EUm5
-
Formbook payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-