General
-
Target
JaffaCakes118_aa7ab4157c0ea04bfff754a8427eddf57cc270d8cb7b01752cc070c71ac7bdd8
-
Size
213KB
-
Sample
241221-xe3tqawmgv
-
MD5
8394ecb2a0a35cca1f191c1798cab6ce
-
SHA1
0866de03627135b370e33ecf65ad13a9be9a2882
-
SHA256
aa7ab4157c0ea04bfff754a8427eddf57cc270d8cb7b01752cc070c71ac7bdd8
-
SHA512
62fcb2c50dc29867d91e3f0e3c1ebc37654fea61fd17124ed68d04e1e0677c3f766fdee69a1b2016c85556f14b4d7f9a50f12d2e69d987120ced5e24be47f24b
-
SSDEEP
6144:H0175CEz5SCTVAjVHIDiErhpbNCv0rLlcHKrFZ4:U75CITVAjVIlhpcv4/4
Static task
static1
Behavioral task
behavioral1
Sample
37fc27ae593c57c90608af9929d7ade4fc5924ec4e795c445c4bf8a5a1bf8585.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37fc27ae593c57c90608af9929d7ade4fc5924ec4e795c445c4bf8a5a1bf8585.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xxrkypy.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
xxrkypy.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
f4ca
omFHB5ajfJi1UEIEV9XcoRw=
UBjJkmQPyprdhcFF/bdCWQ==
evGKkBUj1je+otcfpw==
KgvGVeOATSt3nug0BIOm2JvOQycB
Lv6o3K0r9aSjI0lr9fg1txw=
LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=
99dte0XauJfk6Xv+uQxJFgA1gMktBA==
21FkkGB9gMniDQw2ffu6
r4lKBM/q6TZwVZfS
F+14qHeVWi56KdQ=
BgWXRsVoICMvvQ==
I+EozFl0Uy56KdQ=
xoXCgEllKEbWfjFCCLo=
qo9G1lXvvGt5GkxrLQWw
ORNlYic0PJ2ip4geEFSv
Yj+GFpvFxy0uVYx1fLI/XQ==
XL+veIKPjOTe4fjvFs+n
D2JKVAfuakXCAyoEvw==
voWJU81tH56wvt/vImbCcgVd
dVEcwFrmb8bZ4vXvFs+n
CMlcaOUF6cB+8Bnm2Kc=
NpYV3moXNE+ZQ4f9nVGCSA==
/GRkjGd1acLHyeLvImbCcgVd
R52MlF+Ag+LtFr1QKa7Zf/5a
kVD/mSO1YK75pA==
5q3IANfo/JHiDww2ffu6
4i8RFOH2ACRdhzja
VLWOSRe00XX6sNsijPzqiiWfFgf1J+g=
qnsgRFL46lWG
xo1QHOyKS9rj4fjvFs+n
mIHZlAqzS6ymmpMCU1uyZgE=
WCtjiGCFl/4JTiJ0R60=
c0vpAtZ3fY7TeLfdcnASQg==
Y87Xlic9/1+q3g/pUArVoB4=
kKOsRsf05wBOd67a
dDmgYgOZZ0aCMVwgDha4bgc=
ieXCbvcCyja+otcfpw==
Fd0XQwkTHHaBmNDvImbCcgVd
PK/M6eM8xOwqvw==
Pf0q8MdfICMvvQ==
EO8aPQwf7z2Du+XvImbCcgVd
BeUisSg/Ql6uJcg=
ay2v2pz4gomTESLosQ==
AGjX3ak2B+FyQ9ZKrQ==
Du0y0UXomyoxT4/arA8Du3FvpwE=
xhV7OrDTdonq4fjvFs+n
9+s2xTlaW66p2IAAnVkDQA==
AuS2UeN4Nsvl5vo8J67Zf/5a
B1vK2590RiUuuw==
/709BIUfMCIln8sus2u2aAM=
BMpYckjp699wVZfS
Pf2AqIscEhlpHlnV18IvVQk=
RKUTxUbz/zFroN/LLq+kIdZM
IuuiQ9pj7ZzciLVPiks4Rxc=
0KBn8XAV7NNm2xPxuA==
nv7yBtDj4UNE/ju8er1EZSanBXfyLv4=
sBgf41X1vKTwUspTsg==
5bk4+oQWD+X01tBEqQ==
c08KjxWnau8DDSsESMKNI+P5G/6/sYjU6g==
RJiyeEVj/N3rhNAW3qU=
v6O7hhQxA//+Oyq2ms9DWQ==
7MdHCYCb4OT5pg==
Je0NLgIfKIeFuyjxYD+i
68P+tIkhBdlwVZfS
inthecryptolane.com
Targets
-
-
Target
37fc27ae593c57c90608af9929d7ade4fc5924ec4e795c445c4bf8a5a1bf8585
-
Size
225KB
-
MD5
3359916b838254bede2336070d99b6e5
-
SHA1
ae40ca0d6b91624cd8d9ef1b30e1ce2338c3309f
-
SHA256
37fc27ae593c57c90608af9929d7ade4fc5924ec4e795c445c4bf8a5a1bf8585
-
SHA512
989e405e72f4be4abcca21e8b8cb84b37165e00a88a13f3186801f0f64be8c6a7e70d069e69dfb58f71622a6b41b5c9a93d20279e4a3c580f3e2f488d59a7406
-
SSDEEP
3072:qUJoFfWzzl+cSM2wPddXssJXKAI95ibwrhlikpXbeK3eMmR6M3vcJLSmKqcHKrF+:qweEp2KjV5IDiErh7bNmv0JLlcHKrF+T
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
xxrkypy.exe
-
Size
5KB
-
MD5
818e4839cf473064fde652fb001fcce6
-
SHA1
b051185eddc6992bd0b4092e338ed067487af57a
-
SHA256
72eefcdcbb8c9510a83e9ce80810d84688416ede5d4041aee4944f04b7cb903b
-
SHA512
9b8aa6a9ef6d125f80ef555429d45e970f873440d95ac8f687a2ff782d46fdf71c8b66d351010346b989fbeb74f815e96b774a6c463aa9e974399e9a67e50c06
-
SSDEEP
96:bhrJTnFlgFjwaepQr6SRmoynhKMTnHOjx:BJ4Fsaez6moyncMTnH
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-