General
-
Target
7b8607f60471a33a06ed343cb076b246_JaffaCakes118
-
Size
1.2MB
-
Sample
240731-gy3p3avckh
-
MD5
7b8607f60471a33a06ed343cb076b246
-
SHA1
44a64d54193aa07432aaeda41f574798f535703c
-
SHA256
da3a2f5c493aabfba08548ebf199ec7ab8cb247edc1b006a448c153960ac7600
-
SHA512
50177aaea9664f4f6f4a675a189c1822aae4db94800c5f839b2b8a662eda9c311b919b646539f98e5e7ea8254f4fa079a88a37518a11bb36206f8e01e2dae2ee
-
SSDEEP
12288:u8nJ2WI0qaqmvK4Cq/hgoMWcAYTf+pPapD7ayR:uE2WI0vq6K4Cq/h+WBqd7ayR
Static task
static1
Behavioral task
behavioral1
Sample
DHL Shipment Notification 5011586210.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DHL Shipment Notification 5011586210.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
formbook
4.1
mq3
clarksonassistivetech.com
sjzam6.com
designermarken-outlet.online
kampoengkurma.online
shamsmaltdrinks.com
d7r4u1.info
sportsboulder.com
snagabag31.com
am0rsexkreto.com
sj233.com
estaladores.online
icbjesusdenazaret.net
bobi-frs.net
steminvr.com
yoxi.ltd
aaronnational.com
charliezangelzagency.com
rolex218238.com
snacksejuice.com
educationgrants.site
powerciser.com
endemikhardwoods.com
runcessories.com
cock-or-ball.com
thehuyertrnes.com
consultaprobidad.info
changancloud.com
therryvanvreden.com
latableovale.com
springholdingsbnk.com
hugoph.com
sarealodinge.com
searchmakeup.com
eddiefigure.win
r-ev-ival.com
essentialassetstraining.net
yolandekouznetsov.com
lianxiaoshu.com
3dcellmodelscongress.com
xn--3bst11cpvj0o2a.com
enginardergisi.com
tams.rocks
askcopdtreatmentok.live
bncosmetics.com
greenerpharms.com
lettersfromsanta.email
spartanpronos.com
wwwx36599.com
julqe.com
dannyhustle.com
evevon.com
copycatfunnels.com
tzacg.com
eckgjx.men
izzymetics.com
uzhackteam.com
islandlifeaccounting.com
hnbxm.com
missyunita.com
scriptfail006.win
blackgirlgenius.com
herzfeldandrubin.com
operatorcloud.net
cielarkodesign.com
porcber.com
Targets
-
-
Target
DHL Shipment Notification 5011586210.exe
-
Size
358KB
-
MD5
8ea0022fe9bfb7a53c0650a1991d9420
-
SHA1
65cca2488da8a1d479e2ef9745a27c7c2495f6c4
-
SHA256
51e2e890ac898a62cb6478414ac1079df55a036da252026d4f5c8f7f09e400b3
-
SHA512
c9129be7dcce8b5dd560e7c36d2177c7b5a6a88a41760db693b35d6b0e14d7293faead0c30a3386cd7be8238ac080a8aa59eff6d28a5269f492167a531e5f64f
-
SSDEEP
6144:zxanJ2WI0ahaqmvK4Cqwpu/e+gnoGpob9cAjkTfpYpPapkSd9ug7x8nInfxD6MR:z8nJ2WI0qaqmvK4Cq/hgoMWcAYTf+pPK
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1