General
-
Target
JaffaCakes118_ab97265f431377cd69aff7aed2c43778360f2d58bad6e0b86c007ad25727bf85
-
Size
270KB
-
Sample
241222-gr7ensxkan
-
MD5
6a3d9b5f0805764733e6fffc1557a69e
-
SHA1
ccb5607aab2e81539dd36ebe208d120c14878ba7
-
SHA256
ab97265f431377cd69aff7aed2c43778360f2d58bad6e0b86c007ad25727bf85
-
SHA512
1df1f58f259d72d09636a6367cadc56483034600b160b71da152ee162b96a1166faba2eea4b8259b09625aa244f8ecd9d3bab5fb8e6273b9da438d1968daf7de
-
SSDEEP
6144:tjlnEMXKkzWEwM3i6YCrKpnTCNAEVBUU5H4yjb3:tjxEMXxWZM3iRC+pnTCdBN5Bb3
Static task
static1
Behavioral task
behavioral1
Sample
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
nqyjqo.exe
Resource
win7-20241010-en
Malware Config
Extracted
formbook
u6hu
OvIuZKrtOMxghbaZbvb/8h9g+Q==
mjHLVEVO8gwVeZ+7
Lh1lcZzH8pTXgpdDzV0vzyVooAsviHQ=
OzJXhMQYaQKNT1aBY/gM8h9g+Q==
WSJFbX28mK+jXVvRJofdtSc=
mEv6JdT2o7Nq++XYt8MFpx5QrhRdhA==
Wxf/NnjMRlBj6JK3jg==
nB21Q0tg7gEVeZ+7
IZinOswGUPAn51eHvCAoMetC
INxV9PYg7AQP0xyDAyg=
kkZP+Iq1AgMVeZ+7
meuru6sSaxxuoLS7gA==
y0jMTFyffedqCSRXVfm/
sJbTfRVKuQScxw==
+ecHP3ayIjYFnb7j2Pt6z5dK
uZnHRwRE9QwVeZ+7
ZBg6Sy054P4oHp0DknCx
nFXn8j4yTuJ9aOfNlw==
35ygHt8uASpReRyDAyg=
8nT3T+8eWeh6aOfNlw==
HhIzb7v+M7I5Sqnk5Gt6z5dK
Nd5UBShihWZZDA8=
CcrOdQtKpUrKSJqzig==
T/WOykxDMIU8/Q0=
XBwiL8gHqMd9JUiiX3+9
kpC3/164HctgequkvgoZQw==
enHp66c8IjQ=
aQYGrJLj3msLO5VP2WJqjW7+rhRdhA==
vDXNC+Q7VTNCCxI=
xWh0G6/2cIFB5ufaqTkHqGRN7zt5
jFLwNR5qOoU8/Q0=
IRa5/8L8vs2xLYKx
L5oor6OvWINoLTpfXvf98h9g+Q==
01FVerpZiCu82g==
IshjpT6he6Y9
UNuJ2awhgexLBRA=
kQD/IkhTZoRsfRyDAyg=
wIQ4Yy91Q3xYCDiWvgoZQw==
xJbODWKuFKgLsaGvvgoZQw==
CooPm7PhhIylxy3RGrmDFds77ARo
xHau8nb55cDT1cKz
rWTumLcgL1BSeRyDAyg=
ejPpClNWuQScxw==
oEH5T+cGGqjrNmkVmrI/bi8=
EJKwS83Y4nfe9CuKRmSu
DM2GjMuIuQScxw==
iAWaJTWEiB9Z4RyDAyg=
CtYQsdIzKoU8/Q0=
zpzF/GbBgje3aOfNlw==
F8xug9XSzeDT5pD3RF6q
FqukyevwFLkOyxyDAyg=
QjLUF95BcpCpiK24gA==
vnUTT+0UgexLBRA=
31brkKCS+H4VeZ+7
RQez61BOWa1I+Ac=
OS7mmaK7bIe4j5cqaxQJ8h9g+Q==
rlbMZ37Mq7WXSYSv/iI=
hzTCZITPnqu68El/e4XNnoPr0RJx
hVAJKOpaZsFdDxQ=
O0b/K5Upgg==
jhMiu0550a6bqAu+NYfdtSc=
e8pri9rk9lNKKYkHZe4N8h9g+Q==
7LVrhEajdHxxfRyDAyg=
52hl5Fpec9eCkvqdAiA=
cp12326.com
Targets
-
-
Target
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088
-
Size
282KB
-
MD5
a8566feb30efadda298aa9aa48ed6231
-
SHA1
3500451818de70121de56672eae034a73674ac55
-
SHA256
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088
-
SHA512
c8ce0767ec6e6c6bbb23169ea5a0981e3dd49b794d09065d84bcc200f27a5543d39b20991955cddb351350f93d75fdfef871f2c6bcacca00abe57cea06122397
-
SSDEEP
6144:MEa0NZojwkXWEwM3e6YMrKpnTCNATU5H4yjyY:XZ+nWZM3eRM+pnTCn5ByY
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
nqyjqo.exe
-
Size
100KB
-
MD5
3d5e9bfede23e9c1b446fc3f9274d764
-
SHA1
0844992797324021269266770a5c77d31f4ae95f
-
SHA256
77a8bd4f7e493bf79ecc66caeabfa0e769c8a236cf67c61c94d5f8c58cc69d3e
-
SHA512
6c8f750bbb4d35c055390d72c3b8232e646390155532517640fa479ee0b2d1891997ff18d26c01a1d66c9d751d3f6215387f1df12d73f0249acdc7827647cb52
-
SSDEEP
3072:qiOJNQvDOGx9jVgAdE9UsbbrkQFqhDJ255C5M4Q:sYDJXgTUmzq+
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-