General
-
Target
JaffaCakes118_f5ce0c2e0bc3027a6acc59824c809ba92c7f514eaffb77b08e13137e37c85028
-
Size
274KB
-
Sample
241222-bmdc5sxlbs
-
MD5
a1acbb5dc8e81d5e1b55b06ce64f9164
-
SHA1
2a3f6907807212d9acafc3c945396af20e30e3f8
-
SHA256
f5ce0c2e0bc3027a6acc59824c809ba92c7f514eaffb77b08e13137e37c85028
-
SHA512
da9eb720075f27ccce55c54b190ed3789edcbd7a4dd068df6c5ea09a97fc70478c260f706c18a31e03cf2c1b31360a526b59e99dfffc50ac5cce60b6d6dc777c
-
SSDEEP
6144:aj5RGWHqsWhoQ9Yeb4to7+QvcWtOipFhUU1dMK8:auK2oQ9S2EAFhUU1dM3
Static task
static1
Behavioral task
behavioral1
Sample
02510#ITEMOrder.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
02510#ITEMOrder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/owuqnjwjhmx.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/owuqnjwjhmx.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
4.1
ct6s
liaquatsibtian.com
erisa.cymru
theultimateone.world
petpartner.info
edison-press.com
ryanmurazik.icu
bukasystems.com
kitsusimplex.com
qatarstyleart.com
brkhot.top
paehdfdtrujdfhs.xyz
createdbybonk.com
kuihoon.com
deathtocustomerservice.com
iotimb.com
greendiamond.pw
millionaireproducers.academy
websitemolsa.com
cbshomeimprovement.com
eardunder.quest
qdsrogijnsoiaha.xyz
winsimplebet8.com
nguyendinhmanh.online
straforkutu.online
jtbfunnels.xyz
sz-videocom.com
budteeshirts.com
teinkstash.com
aohuajz.com
awcarsales.com
thankful.love
yukselfirca.com
gamblz.com
prologuepr.com
georgemanuel.com
crewcamel.team
digesters.info
diosaempoderada.com
pobbs65.xyz
monoscribe.com
kelseycoding.com
lauertmouku.quest
techtalks-2021.com
zhi2021.com
bslf.xyz
socialdiseaseshop.com
bsnguyenhuunam.com
glozhair.com
pieko.net
hirenearyou.com
xoarin.online
beyondracula.com
hoshikoblog1.com
bigbet2298.com
pricetrust-shop.com
afiliadosilva.com
alrayangroups.com
sittingonforgis.online
fiitnutr.com
killeendirectconnection.com
princesstvchannels.com
belleshopdz.com
vanillanoir.com
homodont.com
metalzj.quest
Targets
-
-
Target
02510#ITEMOrder.doc
-
Size
386KB
-
MD5
c94b3a3db4363cf785261a704a04aba3
-
SHA1
4c3cd39711642aa687f9a341ea0fd86a74691ac9
-
SHA256
85601ede72b1c348db5663e3782e7b3f3157c2356e2c90b769bb2afc2d476e4c
-
SHA512
4ee10ccd71645bc9b647792b43f3d0a62ac8f8c61b4221b28a098cfad31cd4f72a89e7dcbda105c1e8e3dc9297165449730ad412e9c7e25b609ce2665049fb7c
-
SSDEEP
6144:OBlL/ty168dXGQLRWg2RNtJsLPE7dyswkUX8OI7W6OieoSzjL3qpJ3U53uE/H:ML9mLRiRpsLcJyzDI3onLao53ue
-
Formbook family
-
Formbook payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/owuqnjwjhmx.dll
-
Size
43KB
-
MD5
8a1dffc79873318c04f8a1faa7b5c10f
-
SHA1
ec7bf093eb33b20401b47aa307b785e70617c73d
-
SHA256
18e3fcb2014557bcf59994871e50dcc92ed677c6d3ecbfb02023574ede67c6f7
-
SHA512
f7c891e6c8278dbc38d79f4dbdedd6cb1c966f77d0fda3c43de9f788946bf4129a9b9ba88a4c1d0d7f3a294ab4619a1c9d6ccfd1c23a34954d09dc532a0d5d62
-
SSDEEP
768:7TVkXMvJB4sWHqz4D0ceGIuf6qaBxlgjHBzb2p:7TCAzmIuiqaBxlgjHdW
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-