General
-
Target
JaffaCakes118_9ef449444431935cc53bcfddb15b35b1dd62495b06d16493862ed6acc897135e
-
Size
531KB
-
Sample
241225-qg6j3atmgw
-
MD5
c435ad61784115c3ba480b60e3965dad
-
SHA1
b783759fa03fa29c1582e84360ec632392732aec
-
SHA256
9ef449444431935cc53bcfddb15b35b1dd62495b06d16493862ed6acc897135e
-
SHA512
e4cca574f5b4f5dead766a23bf6dafc1f707697c2977e356b4701253ebdd573dd5fcc9072e26694f5171895610ce0a68fd9f920982c98065a9b05f208310e80e
-
SSDEEP
12288:E6J97gkBAZshcBJgWCCN9s9oF1oeQZvMzC5WsR8Tb3:E6J98kB5czgYgqceS2C5RR8Tb3
Static task
static1
Behavioral task
behavioral1
Sample
Nuevo orden 1.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
o27a
rfmag.club
zkskzt.xyz
prestitiprivatodaviden26.space
topfxvn.com
irreverentlabs.net
untosuit.com
conquestdevelopmentgroup.com
meterarchitects.com
gwendolyngantt.com
1xpromocode.site
sellloooofolk.xyz
alonzorobertsunderwriting.info
harisalikhan.com
gocqsf.com
carrotstay.xyz
fortumex.com
xiaosage18.xyz
archeage-unchained.com
logicskopisch.world
xj9j.com
beneva.xyz
jsgygz.com
convergenty.com
blash.tools
hbydyj.com
galascan.net
blockchainproperties.tech
thumun.com
hintsquare.com
solana-epic-cats.com
pesix.space
unlimitedlove.net
glyspdj.com
bridgetonova.com
elevators.club
tron-web.xyz
thenookmanly.com
wattswater.xyz
gamesfree.site
globalcryptogiving.com
vitalsignsindia.com
drbrians.com
dawgtreats.tech
quitmetrics.com
dussr.com
halfaswellpodcast.com
towndao.xyz
hqsev.site
wrkjyy07.xyz
thietlikesub06.xyz
hyperintelligence.quest
taptruckhendersonville.com
casgani.com
happybirthdaytony.com
hsuwellness.com
shiftprn.com
subqusociety.com
0515jz.com
eltaherfarm.com
jpyck.xyz
stxzw.com
kpans.xyz
ifzsonline.com
theblackelephantproductions.com
therieslingreport.com
Targets
-
-
Target
Nuevo orden 1.exe
-
Size
555KB
-
MD5
b9ba47bd36eddc3ec6690f867f4f065c
-
SHA1
145372771d3ad06c2d7e1bfd8cee311fc8b4c000
-
SHA256
035dd068094e680fb06f62eb2b838b182d29df63883906f0031444f1bea56507
-
SHA512
d5e4d9389c85a890c90660353ec842c2e7c2ac854f171a4f760d74d200c946c37868c3d1b8d54bb1f298bdf174c7eca4c18f3340676905f20330c37013acad99
-
SSDEEP
12288:7z90jNqYHj5TDlbC3F5A+56YYLjtY9KEj/CeB:7ulYJm5IKEj6
-
Formbook family
-
Formbook payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-