General
-
Target
JaffaCakes118_7c7d4f4bbfb59172de4bd6c478c510f5d87c4f28f9952c4edd543ce798fe14d2
-
Size
241KB
-
Sample
241224-w7n1latqbk
-
MD5
8b6df98fda5955075706de3a6d006c1f
-
SHA1
fbd306838666b859a660076204870dd98ff2e844
-
SHA256
7c7d4f4bbfb59172de4bd6c478c510f5d87c4f28f9952c4edd543ce798fe14d2
-
SHA512
c18029fd6d3a28dde7287f4b2ce06aa93f674cab7929a78cd3b44373d3f71919670d628453dd321feacbfef90a14dbf89439e034f59f6bb325c308a8eaff9bea
-
SSDEEP
6144:ApAHIgNruez+8XyDlk/hURIE3Rd/ymRvNNqv78:ApA7qN8Xf/hUfB9yivNQv4
Static task
static1
Behavioral task
behavioral1
Sample
19.10.2022-21.10.2022 Ekstre.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19.10.2022-21.10.2022 Ekstre.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
oujsjnpvzn.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
oujsjnpvzn.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
4.1
oy10
wzwanju.com
vaultnutrition.info
propane-gallon.site
balkanmetin2.com
costa-del-sol.email
kayodeokikiolu.com
singlesshirts.com
nearestfoods.com
trenddetail.com
yihaimaidan.net
dfdr3r.site
tuitionmatters.co.uk
benglas.online
coloraja.xyz
tianzicheng.com
lamkt.com
dileca.com
6698856.com
vishi.store
ablehair.com
superios.life
jsmultimedia.com
deadstone.store
specialtyhall.com
jurongchuan.top
kitchenservice.xyz
thediverseinvestor.com
081206.com
willdevphotography.co.uk
betsportsvt.com
nariaex.com
hronestop.net
allsecurityhub.com
altamira.info
mkba.store
packmidias.site
shunft.xyz
alison-winter.com
under-storey.co.uk
jet-india.com
chinagq.net
taprotek.online
spedizionepacchi.com
flowscreedsmanchester.online
chovaytiengop.info
91508.uk
safe365.cloud
flightrepay.co.uk
jokamet.info
asesoriaalicante.pro
hqxr2019.com
alastar.online
automatemyproperty.com
loyaltyovermoneyllc.biz
asperity.sbs
empiron.online
oojaaa.com
daileyduo.com
sxtarena.com
anpost.life
acquybuuphat.com
rautarasti.info
bigboss-digital.com
i-signal.info
rallingslaw.com
Targets
-
-
Target
19.10.2022-21.10.2022 Ekstre.exe
-
Size
254KB
-
MD5
acb287f5d33a3bec62620ef511cd3e6a
-
SHA1
975cec902942585321f353e27d41f7dc4bf5b1f5
-
SHA256
622fcde32b89e9dce35b3513aec205891045470cb1111cf1c88f939cd10065fb
-
SHA512
8041d5d84098881f1051b66322726ef79718334b766e062b139ed11cfdd622c1b498e110954cd56af74bdefda40b676afb496f4b2c3264dc44384fb64221d23e
-
SSDEEP
6144:mbE/HUbHvDIgYx2yMlMdhpE63mj1CRK/dt1ImTXfGaW9:mb/HMylMdhnWj1C/WM9
-
Formbook family
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
oujsjnpvzn.exe
-
Size
58KB
-
MD5
a53bf35dd3f2a0ece1babdf99d98ddb7
-
SHA1
866e4d1315486d4f792e03449def24bf48fba2f5
-
SHA256
f27f1c46335ed31550b8fd38781e85fd498edaf77ffc7fdea7b32f044c5cc26d
-
SHA512
f0ea778f032871260b891116e880c1814a7eeb512b4f649c8a3d355109aed9858128477a8d2c1d12dac5ace5be74879dfd590b9959c309ce67d1879828f679f2
-
SSDEEP
1536:s1ep1tOKxVeU01JVlG9NSstFdGxveJh7LY0GRRxfW:s10tOKinJlwN2ypGR/fW
-
Formbook family
-
Formbook payload
-
Deletes itself
-
Suspicious use of SetThreadContext
-