General
-
Target
JaffaCakes118_884c7ea15aba23c993192d3c0641508443f594ae71c15d068d42fe7022ad82b5
-
Size
238KB
-
Sample
241224-vp3wcssmhw
-
MD5
f12cba59e614a7d49d54418ac8aaa8b2
-
SHA1
cdf5ef0cc4e2d2cdc7a2dc23eb2bb4c9c4d26c69
-
SHA256
884c7ea15aba23c993192d3c0641508443f594ae71c15d068d42fe7022ad82b5
-
SHA512
757e21466572536a1910ae9e612a90c519cad56915ca9e707c59582d929e116480b2b298994ffb544d31927b31a097f3204dce42727d5bb483a31e17d81380a3
-
SSDEEP
6144:RdQK9sfU0Es+fria18ReBfJnCslm0yse770kO1/JGD13n9tI:RdnsfUxs+Oa18ReBYgJeMkmxGDNng
Behavioral task
behavioral1
Sample
41f341ae994cf53488e0a96a6a531c9ef26c31ad763b7f858b278657051be31d.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
73dc
qaimd.info
masterlatform.net
daokequan-pdd.com
danieldelcarmen.com
nissancraft.com
gwenscuisine.com
caoyejiasi.com
jobscsra.com
drinkgarden.com
kountrygirljewelry.com
bavariaimmolounge.com
tepthera.com
buzzstones.com
massagemmasculinaemsp.net
prettymixy.com
czczjy.com
yourorder.win
bridgesbecrazy.com
669usf.info
keithnewbyartgallery.com
glowychloe.com
icelandicblonde.com
ai-jingdong.com
willcbdwork.com
fileunderfemale.com
cyzj168.com
nouliveprime.com
ucarvip.com
proudmortgage.com
courageouz.online
jswbk.com
anfilofyev.com
kwbestsouthwest.com
gopayafrica.com
qinglangbg.com
fuduosha.com
waymuli.info
bibanban.com
unitedpetrochemmumbai.com
sapatito.com
hksusv.com
bansko-razlogimoti.com
bossinsure.com
divorcelawyerselpaso.com
llizo.com
ecan-rms-japan.com
domainnamevisions.com
qr-fattura.com
ugha67sd.com
stemcellmagicwand.info
the-clou.com
goldentouchstaffing.com
digipilote.com
natsunat.net
fitnesscrosshome.com
justbarberwilson.com
xn--58-rg1dm64gztk.com
lilliannadhir.info
phoenixnewtomes.com
bakedontrail.com
misviajesesr.com
quemarestaurant.com
spendesamen.com
ngoinhadienmay.site
joomlas123.com
Targets
-
-
Target
41f341ae994cf53488e0a96a6a531c9ef26c31ad763b7f858b278657051be31d.exe
-
Size
532KB
-
MD5
b2f556607df50936eb1c0664034427ba
-
SHA1
7ca4894a3804e721e85d31941bec38170099226e
-
SHA256
41f341ae994cf53488e0a96a6a531c9ef26c31ad763b7f858b278657051be31d
-
SHA512
a1ded171b38c3e5a37dba096e8c04b19c7cd3e46587b7681c00df2baad1e28a2ac917857e0c59de7448ed353383dc6b75c4f2cd93804028e05223bada11b471a
-
SSDEEP
6144:VaUDG3Kp1D6VEJD6LpypZ5xw6ZzzyJ9VecftKGjiqG4ErnbST6n+lDAAG8:VaUDd76VEt6QpZ5x+ltBmqG4ErmdAAr
-
Formbook family
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-