General
-
Target
c40b2c40c1c0e82ecb066104d4208dad25f3af04dff98a9463cfe5ed82707ef4.rar.danger
-
Size
10KB
-
Sample
240808-qqv5patgjm
-
MD5
39ece005776ab966c79c69e21f621f48
-
SHA1
7762bedabdac482cc79c88a58366e1ca5987ba33
-
SHA256
c40b2c40c1c0e82ecb066104d4208dad25f3af04dff98a9463cfe5ed82707ef4
-
SHA512
d55a6e9da62048057e246c7c27e645b2cc0980d8d5e776d1cd5d96751e4785c28d9099c22c07bfcce76279318400db596525519fdeee12fc585b09eefe89dceb
-
SSDEEP
192:jTtq5OFRA9ey3W4ZPPFkwdP/d7QGDa5L0kN3ExPx/Z+piK+ylFPUwYKMsaOKd:3tju9ey/ZSwp17QGm5Qo3sPMtz1MH
Static task
static1
Behavioral task
behavioral1
Sample
Arrival Notice_AWB 4560943391_PDF.vbs
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Arrival Notice_AWB 4560943391_PDF.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Arrival Notice_AWB 4560943391_PDF.vbs
Resource
win11-20240802-en
Malware Config
Extracted
formbook
4.1
sy52
wxxj.asia
emu-oil.online
theprogressiontalks.com
saigonvape.com
cb257.pro
inucana.com
xn--pdr89n.vip
vtc.bzh
connexionsink.com
mastersofthevibes.com
mallsetuae.shop
bellaandbling.com
wagi88.one
273618.bid
japanvietnam-mall.com
lkd1t.rest
oflgjgiq.xyz
calliblography.com
idz8u.vip
marrybears.com
y7fzd3.com
xiaojuanzhang.net
bizconverge.com
videoelevate.com
kaliventures.net
vitamineseo.com
wispsa.xyz
wacreans.xyz
vibrancerisk.com
aheryth-bijoux.com
roofingplainfield.com
vrmu.asia
om0ve.rest
pknymayorsball.com
antonioshove.com
noblesageapothecary.com
fee067.shop
aity271.com
thecdljobcast.com
kewpieland.com
wasitopen.com
owpg.online
livinghopelactation.shop
data-analysis-cl.autos
wxxj.asia
99858.photos
usex.fun
ghherdretdhrt.xyz
castelaimoveis.store
rudoen677j.xyz
bos717selalu.shop
mimin-ovo777.info
hylbywb14.xyz
smart25.xyz
3658kf.com
luceroropehorses.com
truckcrashconsultants.com
mdnry.com
onlinegrowthnetwork.com
fdykykzk.xyz
www461bb.vip
bondwellfit.com
usex.fun
hbnv.xyz
adgenvni.xyz
Targets
-
-
Target
Arrival Notice_AWB 4560943391_PDF.vbs
-
Size
29KB
-
MD5
592e05d52785ac7ce91bedee1bed070a
-
SHA1
fd7c461e71a467deaff4ef320482685347077943
-
SHA256
ff3261173380df6010b5f2fec463df92180220c8ae6631637937b097b73af3f1
-
SHA512
def9b1a31ccaa1942d7e0b0de4949bc94216aaf17622ec2de9c90b30e9cf50ae658da07e428985ae5a0aed60f9913937ed5fce5747d0ae61703894afbf3dc9c4
-
SSDEEP
384:YzMKK76JtZpa/CQnG5daT7K5NV3mMEMRtkRExJ:YzMKHJtZpa/lnZT2NxmMzk6
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1