General
-
Target
JaffaCakes118_24cb35ea55c1ecbf1c90b517b9f721b9f86dfe77d87cb39b7524729319f95aa3
-
Size
267KB
-
Sample
241223-1wm2dasqfq
-
MD5
5bf5c9b0d6cfd636a4fb95c446147ce4
-
SHA1
4fbf4af3d820c8e906f872e85c0496485c289575
-
SHA256
24cb35ea55c1ecbf1c90b517b9f721b9f86dfe77d87cb39b7524729319f95aa3
-
SHA512
371f7d4173f17f390e39dcb1dea3344316515d73c7a4daf235ed57c4c200c076344215cd12acf63230411269b0d02588f55e75321d9ec43cfe3e47cffdcad39a
-
SSDEEP
6144:MHnTFTGAcFP+Ud2s6L/IRRBmrtVtIMdDfPaJQXNfgK8hAD:MHTLY+UeLTrtViMtfPam4K8hO
Static task
static1
Behavioral task
behavioral1
Sample
faktura,pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faktura,pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lejdjsong.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lejdjsong.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
nob2
en+O8QOx9zDZZo6B
4OtleJKQETLZZo6B
xGU74u2nB/TAvy6QCqHWGzhs5rjgJKkH8Q==
Hq3a8RPSF4BJjsCnvBuPXSngiQ==
Ca1w6R7ZEzrZZo6B
V3N7ImFtXIccbqg=
jkdEFrI4Bjj/
rGXE4vP2e7leaO0+Mw==
mFACnMuCTkL+R3Fh+5rYDQ==
k1R/bHxIDwfQHVtMUnukJu3OiA==
Goa71OKQKE9ALQ==
TUVlDTovqKZqfHiwJHaK
VBnCLD8NiCkMIw==
fIbQ7Joi+SgIi/y6E7P5RoPjihFL
UTcvz+rs7OfK+DARp/kwBpv6Jq7TVgs=
rF084AkQIlQmdZwZOg==
6eJWgNCEuf3EAbCxkXiM
JcyQCi86x+3MC8IYjvN0uyjYjg==
S+8thMWBzyTZZo6B
5dDUXJSODfnS/DkyX8Nobh0=
QzE0kgvEkfjJxTGhvsXC0bmBAq7TVgs=
SvGiFDzvQ5VcXWllI3jDCWea
Ex2x0uXbeLCABYvxJw==
Z30INXN68/fPuxyGBX+kJu3OiA==
o1GLrObS0wbIwj+lyCekaxc=
1pNxF0wC1EAR/HTfFGRkZ1U7Qc83ZA==
//F7o9uV5kMsRUARgI14C3rjihFL
x4g54i3bGj7ZZo6B
eXbh/UD+P3ZRZlcnk52DCXXjihFL
45k/3hQOj4FvigaF6b7gGQ==
B/zuidaOS4lSYOddlOTaJu3OiA==
sGRG/0oK20MjGosLNVxz8s27gg==
3J0AWM8U1Fw7U9Y4Mg==
k25qBXEtP3hioh+/qkY=
msuCZooQAPzx
I9T86w+xAgj0ThGCqdTYJu3OiA==
5bfgjq9pJHxNnUTBdR7DCWea
MA3LZqWYM4xkzk4b1XDbKpbYnw==
0JHq2t7kg+W2tZ56HDs+8s27gg==
YzjWe7xxO6RxmI91LHvDCWea
Ed2wYY99DB79PW3nIw==
hy0n2/bx+h77Om9jhtfaJu3OiA==
RyqxprS9TYJnwDvI3FE=
Eie65SLOEWInIAP3puEH0cQCal8=
5cM5KllSUVU+mB+/qkY=
fx3jWq809wrm
DBYgi6qNLZZrvAYUTGuA
MT8E6CM0JQ3c5OHHvyekaxc=
QPzglcfRzcempTeB8YCxJu3OiA==
iiNpWoRq/F8KV4eD
zc43KEkBzsZwtLSYO9oGTofTgh9S
eIgMM3Ql+Ni429L4W5KX
qdsdfCm2rEwrMA==
1J37JFM5QoJZduZBxtPrGQA=
Guf/odWc6fLOHtMePmNZZ2JAQc83ZA==
fDfjTG4UWKZyoF2j6b7gGQ==
CQR0odvibYFQeHuwJHaK
iW2CKi70M4lohoF1fsXU08QCal8=
4cMCASYeFz0WPrYUiCPDCWea
EQLzneCWSY0dhdSW
di2DnryxNqpIdXRxfsXU08QCal8=
ybIwVoc5fb6MmaKpUHx/CXXjihFL
VBFoZXYqad3Mz66yzCekaxc=
Arnp2/y0d8iXguxwqsWpu8CHAq7TVgs=
futurelightiq.com
Targets
-
-
Target
faktura,pdf.exe
-
Size
484KB
-
MD5
0c2779d8b1c98fee81f0e5f0f47b1076
-
SHA1
5dc8b937c91d42bfb4870970a85d6b415e208aba
-
SHA256
02928b2d3818c82f6b0cd4d1c69a5717b36d56a6ede9e8b6e6dfad55d9165406
-
SHA512
4a60973ec7ea718fb5d562d030876987fb5006c9a1f0a2241dc7aca1800c0c386aed3be4e651f7aa158ccf4d133ee7e8f0de4f608f0f1a7577ed9e4ca9fcbc3b
-
SSDEEP
6144:eNeZkjUUpNggUZvLl6SpvAkfcxMLiEVCN4WQBWkNtU:eNAi5UFLl6SpvAkfcx4iEVRWQrNtU
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
lejdjsong.exe
-
Size
73KB
-
MD5
86a148c54d7a5ee49386393a7bd64e75
-
SHA1
3bcd7adf68d28514c0d362964bf4ac1e067bda6f
-
SHA256
7cc777f463f00d5389c55fe6cc7904b427efd52ab0b2e932ddd1210d6c0eedb6
-
SHA512
214f5530b2adc519243cd0c10af2987275988b45e1050f147391ece49c3ab2ae3ec4dff4f79598a6f9061ae4d70fbc78334d4a1ae2e863ab92628e0b4beb00fb
-
SSDEEP
1536:tBsMIL1gs031sHpiCq9lnLo4LR6ruhb8muP/CAzaJG5dJXBsWScd+u5Ngih:YMA2s031sH81R6ruhbfa/XJH+aNgih
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-