General
-
Target
JaffaCakes118_bf0aefdee6705696a7b997ed585a9ef01b5615149bd077a439917c23c9972557
-
Size
388KB
-
Sample
241223-zfvwlszrcy
-
MD5
dc4caa83135a950e8782843dcc0753b8
-
SHA1
d97413d35eda9bd2c17a7f8895f0d51c765dd898
-
SHA256
bf0aefdee6705696a7b997ed585a9ef01b5615149bd077a439917c23c9972557
-
SHA512
aca2c6ca63675423265c13b6ca21d17def82df283c281f8f7d9d96cd85863cf8824ab98db6b20293ac2deb01125db4f5d0acab4307b4d13103db11c8de4d578e
-
SSDEEP
6144:lVhIW6u9mqynZD7Kht4yxwZhnPy4TpGsq5AnPzjnmE73VMH527MRW/yXldQ6DYaM:ZIW7mBD74VxcNddBAifnm8ExdJqCY
Static task
static1
Behavioral task
behavioral1
Sample
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
qzxe
+ofy/jc//gxWTSyDsHNe/HH9Fw==
JJPj3RBaNUVMfGjFDYHn4VdZS07u9w==
MDmWp98UG5ik7K4=
Lyqf4GqrrNshqB8Rd2k=
GSZF9fyueK9D
go++PQqY5pik7K4=
TUKqEY7b6Pw157uI
Dm2xsOPllslVpt49Vg1pbw==
PTqi5lNcK5ik7K4=
7MgiQoDCx90vLLPOxru2
Sy+TnscLsgODvA==
d95Jmv8+SFddJyKWA4T92cc=
MJHl2jFE+ySkGFO3CIT92cc=
21nQ5Csz6DBxEMSd
MPVPVojhzO5ErK1evXY=
XUSG1EWdjJ0YiY0nmpLf2M8=
wzmZpONyKVr2QKY=
Jm3IFI7RxANTgTim+w==
XUJnuClAAUnCpSMXW1SaExea
ambAG315NEd5RsOeJaudSsZCQBMrrtr/Lg==
GxR6x0GEeY4Xg7dee6mv
UC2ExkyfoO0t/hCB5h88C2cqqGf39Q==
cnrH3ghEP1toeSyb8Q==
+lXACnh5FjxxEMSd
41Om33B1LlMlOima8w==
374xeesgHWChhPfnYF2ytnilCX4j
qXLHCHqBOECI6i93wDUs59eVPa+SJ3Wj
ThuDlNbVSpzOqQ==
c27AHY/670hDGWHGEN+4
56v9BCFkaq0D/mxmvnGNSsNOqGf39Q==
edxEjgMe3QycGMz8LWqIVbaS
A3ndM5meZ8IGlds+Vg1pbw==
Xr4MEUVMCRVjwGlFmtMLymv8Hw==
59oqdAJDRne9QbKK
vyttwC47+zB6T8z8LWqIVbaS
abv1PLX56RRPIA9urxx5a9HhHYMp
ac8XEVWmpMHOqCUHQkmaExea
VlGk9HuNO0SHrptKV9r53M8=
5r8EXuQoL0bMRoj1SIcS41TAiB0=
S6oEUMbOk8P8z84ddj2EjV/RXepMWaGm
szGh2VGGgbguIM1zs28=
Qh9zlLk/6wVP5Ngynh8S0H6MZRU=
sw1RlQ8pzu8ALObSD4T92cc=
w1ot29pcYJipArc=
KgM/UIjjy+s0j8ZFhXXTxH6MZRU=
oJvgMZ3h5Onx0L4toB55b+iq7QZq7RU=
YVWqrfbxoNtorJ5KV9r53M8=
ngtbVp/jW32LYESy7SdUFRzhHYMp
LfBEhu75X77Y5K2lAoT92cc=
2WF9BELd2w0=
VUmgpdMcF0G5B763C4T92cc=
0DWY4FhpFVfZL3rYN5/IaiPhFQ==
XtU0eOnyq7gTerZee6mv
Sa2FDY/VzvI6jTxee6mv
b0ye9WSomZEGOajKzcS2
X9I4gBEUxutu0M1zs28=
oP9nZ5vu4yJneSyb8Q==
b8okJmZlIE1keSyb8Q==
qYbVKpOWPFNhOG7Ww4T92cc=
EgFgYKWqL7lCnkVee6mv
rghRYJPz6/H61lhLnZWG6iKhBQ==
k2vJyvFENUNxEMSd
k3DK3edZrEiT/LM=
GgtpvCU07j3DEFO8F5L7ymv8Hw==
ykd-services.net
Targets
-
-
Target
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe
-
Size
447KB
-
MD5
601b2d6daefd3d2eca786e4d261a753c
-
SHA1
3833e13c1f023af9cc7755b9e696a66c75bf03bb
-
SHA256
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45
-
SHA512
4b4f93670380e9bbdc2d1d962db5fbc41531c2bff474a4a44b09ae665ba000b39a3ae6a0c6a4acda05c5d9f2f508342ad2293ba6c65de1178c77c231e7b1121a
-
SSDEEP
12288:qX3f3jN2fyF88TTI5qa4fcujtyxE8fuDw2qcSo3:afxni8Y5GfbUxKw2co
-
Formbook family
-
Suspicious use of SetThreadContext
-