General
-
Target
JaffaCakes118_419de44087b42e1b0a3dbd07b1f58c4d70559760c555c3b26f647ce70fcc40a4
-
Size
210KB
-
Sample
241221-yhb1vaxrfp
-
MD5
8eaa08dc366343a0c7e77223ff2755eb
-
SHA1
6c9ca211a7e7122dce13e4eac2234e1881bda373
-
SHA256
419de44087b42e1b0a3dbd07b1f58c4d70559760c555c3b26f647ce70fcc40a4
-
SHA512
e22c3db51395cd3cd414b5e3f9bb490ade15d8b754250e9bda826dc4f4cf165eaf2e8bc6208e1398e7e20bed0b6d59007a3eaf4575c24e078b19c990c12e30cf
-
SSDEEP
3072:NO9+7vtG0Idir53lOJ6Dz4k3BrCvzstwIfro6jvAmyYzwksJWIpYaS2h0GZZPkoK:Y9+xG1i3ZPAp6jYmygwksWIpYaS2DC
Static task
static1
Behavioral task
behavioral1
Sample
jetsduu7564.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
jetsduu7564.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dufjl.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
je14
innervisionbuildings.com
theenergysocialite.com
565548.com
panghr.com
onlyonesolutions.com
stjohnzone6.com
cnotes.rest
helfeb.online
xixi-s-inc.club
easilyentered.com
theshopx.store
mrclean-ac.com
miamibeachwateradventures.com
jpearce.co.uk
seseragi-bunkou.com
minimaddie.com
commbank-help-849c3.com
segohandelsonderneming.com
namthanhreal.com
fototerapi.online
your-download.com
klindt.one
sellerscourt.com
francoislambert.store
smokedoutvapes.co.uk
rundacg.com
flavors-and-spices-lyon.com
qifengsuo.com
sunnyislesgardens.com
tunneldutransit.com
restorecodes.website
blast4me.com
bingser.space
co-gpco.com
emporioaliwen.com
mr5g.com
abcp666.com
consulvip.net
sagaming168.info
zjpbhsuz.top
socal-labworx.com
arethaglennevents.com
rafiqsiregar.com
esgh2.com
veirdmusic.com
abzcc.xyz
8065yp.com
dronebazar.com
duetpbr.com
apartamentoslaencantada.com
digigold.info
homedecorsuppliers.com
duenorthrm.com
xmmdsy.com
ddstennessee.com
marmeluz.com
ragnallhess.com
methinelli.com
randomlymetheseer.com
magicgrowthproducts.com
shreejistudio.com
mattress-37684.com
yellyfishfilms.com
www1111cpw.com
tigermedlagroup.com
Targets
-
-
Target
jetsduu7564.exe
-
Size
222KB
-
MD5
75dc2f78f5b5c89fbee266137feec698
-
SHA1
0b2f0dd1cd2909336a6a3f553f7c7e30e4557c1b
-
SHA256
ca9dc37d5af616843ef202f89a4ce2cef6fbbc3bce92456193af9cc77bea1af0
-
SHA512
823d6c55719ff22634fa7c3538768e5dbfe65ff9944dda228b541dbaac33d00367c2e8eb2530eb40fcdf11692e96bd5bc91d51348afe2998ef84527462b3f9b4
-
SSDEEP
3072:WfJSq+ytGIon9KcSMNDd7ul1JUx6edox1vva7m8f4xQ3bWoG5hlYkE83EHduo9IM:MEa0NXUM6QA9dtE8y+pct1v
-
Formbook family
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
dufjl.exe
-
Size
6KB
-
MD5
74cbafe65a6f4de0cca11172f174b1fd
-
SHA1
515a076a1f3e5ea4290024e8d17a01df8b7569ce
-
SHA256
36c72fdce14ac0b58ca33cc96891c957e819aef91e0fb9ae0ada132105326df0
-
SHA512
0e7bb057721a2317fabfa520a6fac65be461c8ff5f6845a15b04b8914016ab1dcc4ecdc3f7a91c3ce1d4b59b88991e7cb4e03c31a9822f8ed0d4a20a20a1ea94
-
SSDEEP
96:LIhA9mR3hWEjndQAqAYYWEjtntrrwQbY5wSvqfxl:6RrjndQAq8jFRUQbH
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-