General
-
Target
INQUIRY 2024-SP0006-B(01).rar
-
Size
966KB
-
Sample
240925-mwn2savarh
-
MD5
61e3d1ef92c2702a0a7bbac85b8e7772
-
SHA1
0e868afbce96f859f9043300084f4e9e1d86e4ed
-
SHA256
e182a3a8f40704596c5f0516437380f35b395406c5b7fb29ef6b148f5274d5fd
-
SHA512
8d010aa2310d3279c0be76e003f1e2edea1984a9181c3fd555c9c86ed7adb3b971efb5d2d14a280b8a5df19816da195240f4b7bed244356b9a7dfdfb46af8b53
-
SSDEEP
24576:7x8BD9HgtHPDax87SzFZJhhRmolqGx6lWOx7hwwM/jJmU:7x84D7SZxrmZGxjOohIU
Static task
static1
Behavioral task
behavioral1
Sample
Gimegq.exe
Resource
win7-20240708-en
Malware Config
Extracted
formbook
4.1
e62s
ellinksa.shop
uckyspinph.xyz
owdark.net
arriage-therapy-72241.bond
w7ijko4rv4p97b.top
heirbuzzwords.buzz
aspart.shop
ctivemail5-kagoya-com.info
shacertification9.shop
zitcd65k3.buzz
llkosoi.info
ru8.info
rhgtrdjdjykyetrdjftd.buzz
yschoollist.kiwi
oftfolio.online
rograma-de-almacen-2.online
oudoarms.top
mwquas.xyz
orjagaucha.website
nlinechat-mh.online
nlinebankingrates.net
3llyb.vip
42du394dr.autos
ahealthcaretrends2.bond
gbox.net
anatanwater.net
amearcade.shop
ighrane.online
01599.xyz
ams.zone
-mart.vip
42bet.xyz
6snf.shop
nitycacao.shop
arageflooringepoxynearme1.today
c7qkaihvsc.top
amingacor.click
airosstudio.tech
iktokonline.pro
homasotooleboxing.net
ashforhouse24.online
1539.app
atangtoto4.click
ndex.autos
atorengineered.tech
angkalantogel.company
ajudepo777.top
jacksontimepiece.net
gstudio-ai.homes
unter-saaaa.buzz
atageneral.sbs
ingston-saaab.buzz
i5t3.christmas
ampanyaak.click
dneshima.today
angbaojia.top
ubuz.net
pp-games-delearglu.xyz
insgw.bond
7f243xb.skin
roliig.top
wdie3162.vip
reechagroup.vip
op-phone-deal.today
orsaperevod.online
Targets
-
-
Target
Gimegq.exe
-
Size
2.0MB
-
MD5
42a6e331406ad55f27ad1e3ad7ba13e6
-
SHA1
75b2c9970e0a356af251dad5f4e64c538bbb0ce3
-
SHA256
845cadd4d3a49f38dbd20a685cbd8c0405ca1af4e69aa252082df841a10d16ab
-
SHA512
2cbbcdbeb156ccfd4b1edabbdf74286418e80bd683b2c002bb8adf7ec02eca78b0da437c413950dd4bda906e4418e310d03db1c2bc74e639702c65b6798ed308
-
SSDEEP
24576:AJPXX+a20rK/dxUpe8PQBANjA3vDxLM50BgKqd7hpnM:
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Formbook payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-