General
-
Target
ff2b5ddd7103aaf61528844199911815_JaffaCakes118
-
Size
567KB
-
Sample
241219-kh522axkcy
-
MD5
ff2b5ddd7103aaf61528844199911815
-
SHA1
c32dd351f06a6c47d5e5055fb18837f43f032ae9
-
SHA256
6f9b085602e501a7689153410afd18c36e638b43c2e6e552ae5cf4c8760d68e3
-
SHA512
f5282eadc9794144f2e43804470c9a8afafe7dea4eb918648963f656d3ee1d97e81924b8692ecc1edba7aac5ad7e675a419f02f4aa93f393368a82276ce5ad5e
-
SSDEEP
12288:MAQK5lhUBcKyou6Tj0qhjMgOGKrITHmMf1fy:X/5rUBcK5hjPtOVrIFfty
Static task
static1
Behavioral task
behavioral1
Sample
ff2b5ddd7103aaf61528844199911815_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
formbook
4.1
jw9u
myhvacdeal.com
therizks2022.com
belondo.com
selflovewithallie.com
fkdosdz3.xyz
2commacluboffers.com
beyazyakaetkinlik.com
5sensesbranding.com
clesioalves.com
home2.xyz
talulaboutique.com
marketing-republic.com
mappilog.com
n1a.site
berlinspecials.com
iphone13.media
healthrapidlab.com
outdoorteakgarden.com
i0bqd8ny.xyz
chairzon.com
bakulbiru.com
menstruationapp.com
solarinsurance.online
spanglisheasycampus.com
bigbritimeuk.site
privacy-mods.com
gethappymelon.com
coxfc.com
pokvy.online
hussjekken.cloud
svetofordp.com
100poses.com
openarmslifecoaching.com
tradingcours.com
kelebekescort.net
tianxianzhu.com
stangetzdoc.com
123tuintafels.com
tawanok.com
bestofverona.net
hearttolens.com
cdstuk.com
dominics.one
forestersretreat.com
40tmr4rz.xyz
mobileflatfix.com
morganswan.com
southpointcove.com
theamishgathering.info
taekwondopembrokepines.com
fatefanserver.com
mcateersolutions.com
somniwellness.com
oscdev.net
sensoryfun4tots.com
alphaomegasolution.com
mentale-auszeit.com
hannitytax.com
7x4vc58t.xyz
outve.info
retroverse.net
lundquist.cloud
baofubuy.xyz
fasthomebuysell.com
gistforamerica.com
Targets
-
-
Target
ff2b5ddd7103aaf61528844199911815_JaffaCakes118
-
Size
567KB
-
MD5
ff2b5ddd7103aaf61528844199911815
-
SHA1
c32dd351f06a6c47d5e5055fb18837f43f032ae9
-
SHA256
6f9b085602e501a7689153410afd18c36e638b43c2e6e552ae5cf4c8760d68e3
-
SHA512
f5282eadc9794144f2e43804470c9a8afafe7dea4eb918648963f656d3ee1d97e81924b8692ecc1edba7aac5ad7e675a419f02f4aa93f393368a82276ce5ad5e
-
SSDEEP
12288:MAQK5lhUBcKyou6Tj0qhjMgOGKrITHmMf1fy:X/5rUBcK5hjPtOVrIFfty
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-