General
-
Target
jay.jpg.exe
-
Size
353KB
-
Sample
211206-q75epaebfp
-
MD5
e9de6480e0583d57cbb969c7781a7aa1
-
SHA1
bc8659373ff3a907e7e8ff22b08230a70ef20541
-
SHA256
ad94693e6550491b7d00000042ecad4a74d8a4af46bdd47c79245b0e321836ad
-
SHA512
876ee20f12cfce5be62353d87accd6fb6c9777dd55d34a2b28eac08a7ee00d6feb94e80177f99a4bcb511ed4b210f45db28c7bb978ea5ce6223c43025515d3e5
Static task
static1
Behavioral task
behavioral1
Sample
jay.jpg.exe
Resource
win7-en-20211104
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Targets
-
-
Target
jay.jpg.exe
-
Size
353KB
-
MD5
e9de6480e0583d57cbb969c7781a7aa1
-
SHA1
bc8659373ff3a907e7e8ff22b08230a70ef20541
-
SHA256
ad94693e6550491b7d00000042ecad4a74d8a4af46bdd47c79245b0e321836ad
-
SHA512
876ee20f12cfce5be62353d87accd6fb6c9777dd55d34a2b28eac08a7ee00d6feb94e80177f99a4bcb511ed4b210f45db28c7bb978ea5ce6223c43025515d3e5
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-