General
-
Target
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
-
Size
1.4MB
-
Sample
250122-cvdjjstnal
-
MD5
88f068751d671c40053bdf391c237bd5
-
SHA1
0885f4d1befb6c12afa526769d6c25ae398412ab
-
SHA256
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6
-
SHA512
4a9d265e88c98ecee75e8ff01904a618a86c5a315a6095899efa1e98e541a97a54c1097da9243a7b5b0fab13d640d356c8b42c8ff8a6fe0a609ee13558c85253
-
SSDEEP
24576:JutNHbejV7LluSPKUn+Yw7P20aJRhq+0WBSxJ8sUJjlHcs+0ZlX81kt2i1Pe7Kj:UfHbGRPV67ujzBInUvHwB+Iixy2
Static task
static1
Behavioral task
behavioral1
Sample
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
4.1
hwu6
lf758.vip
locerin-hair.shop
vytech.net
pet-insurance-intl-7990489.live
thepolithat.buzz
d66dr114gl.bond
suv-deals-49508.bond
job-offer-53922.bond
drstone1.click
lebahsemesta57.click
olmanihousel.shop
piedmontcsb.info
trisula888x.top
66sodovna.net
dental-implants-83810.bond
imxtld.club
frozenpines.net
ffgzgbl.xyz
tlc7z.rest
alexismuller.design
6vay.boats
moocatinght.top
hafwje.bond
edmaker.online
simo1simo001.click
vbsdconsultant.click
ux-design-courses-53497.bond
victory88-pay.xyz
suarahati7.xyz
otzen.info
hair-transplantation-65829.bond
gequiltdesins.shop
inefity.cloud
jeeinsight.online
86339.xyz
stairr-lift-find.today
wdgb20.top
91uvq.pro
energyecosystem.app
8e5lr5i9zu.buzz
migraine-treatment-36101.bond
eternityzon.shop
43mjqdyetv.sbs
healthcare-software-74448.bond
bethlark.top
dangdut4dselalu.pro
04506.club
rider.vision
health-insurance-cake.world
apoppynote.com
11817e.com
hiefmotelkeokuk.top
sugatoken.xyz
aragamand.business
alifewithoutlimits.info
vibrantsoul.xyz
olarpanels-outlet.info
ozzd86fih4.online
skbdicat.xyz
cloggedpipes.net
ilsgroup.net
ptcnl.info
backstretch.store
maheshg.xyz
7b5846.online
Targets
-
-
Target
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
-
Size
1.4MB
-
MD5
88f068751d671c40053bdf391c237bd5
-
SHA1
0885f4d1befb6c12afa526769d6c25ae398412ab
-
SHA256
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6
-
SHA512
4a9d265e88c98ecee75e8ff01904a618a86c5a315a6095899efa1e98e541a97a54c1097da9243a7b5b0fab13d640d356c8b42c8ff8a6fe0a609ee13558c85253
-
SSDEEP
24576:JutNHbejV7LluSPKUn+Yw7P20aJRhq+0WBSxJ8sUJjlHcs+0ZlX81kt2i1Pe7Kj:UfHbGRPV67ujzBInUvHwB+Iixy2
-
Formbook family
-
Formbook payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-