General
-
Target
JaffaCakes118_bee560d0333b22a45f7340b3bb0a57a1e8fef6f2cd638ec60cab6dcd310cb226
-
Size
968KB
-
Sample
241226-vwglpssmep
-
MD5
4c886fde6ff10b8cf006a3f9cde9a639
-
SHA1
9fb1d0df2f47358db23e096ece136cda32632a03
-
SHA256
bee560d0333b22a45f7340b3bb0a57a1e8fef6f2cd638ec60cab6dcd310cb226
-
SHA512
b3f4da2e60673c154b4838c22779489d94fec3f6147abf3fbea03659dbf9d48b32c8cbc018ff87d8d0b0fd17c5fb32a9461842b7e84bf7500302bf934f5e3077
-
SSDEEP
24576:mVaFALs03HjKFWpA7S5r2x9wPzWIDY/JkF2qq:mVauY02QGG5r2xVA2qq
Static task
static1
Behavioral task
behavioral1
Sample
9433bad28e2f5b93f26ef692353bf1fbb7f51bddb3e3780446893c10b9f8f6f3.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
c5u0
therapy-bar.com
tronqq.xyz
uniquehaxball.com
hornyhank.com
wanggongting.xyz
sgjndw.com
bigtexaschl.com
bluemilkncookies.com
itimamae.com
palpite.me
404x95.xyz
ham29.store
qualiscotech.com
txsret-gc.com
anthonyroofingco.com
lhfhgy.com
royaldutchapps.com
pandodns.com
xn----7sbbi0bxfbjxd.online
usbcamera.online
cleaningowner.com
mognus.online
marfat.net
pokemonpuzzles.com
miraclemanure.com
ubuntuexpress.com
heigirl.xyz
crsparts.site
italia-fiori.com
kwmejm.xyz
hargaprintercanon.com
idanon.com
drahonflyphd.com
xujianyin.xyz
diamonddivascleaning.biz
nujol.biz
eslthepay.xyz
icaredriving.com
jettingaerospace.com
jsmusicschool-guitar.com
1000ddk.com
dropbox-fileshare.com
goodsreturns.com
57kanmm.com
tkrkgroup.com
evilwest.com
m-l-traders.com
waterdamagerepairtech.com
dacehngmifeng.com
renejka.com
invaluabledomains.com
yourbiowiki.com
fernbrookcapitalpartners.com
rt-planeta.com
amader-sunamganj.com
peadvisoryservices.com
bunshirofukuda.com
tkqfu.com
dunyamegatrade.com
uggbotasargentina.com
vintagemensties.com
califaztecoscalifaztecas.com
hh-by.com
vegasbodypiercing.com
lancblog.xyz
Targets
-
-
Target
9433bad28e2f5b93f26ef692353bf1fbb7f51bddb3e3780446893c10b9f8f6f3
-
Size
999KB
-
MD5
102a8198e3fb713f3cf3f77a1f0c4040
-
SHA1
41465c7ebb50e1202354974841f0c542733b1d98
-
SHA256
9433bad28e2f5b93f26ef692353bf1fbb7f51bddb3e3780446893c10b9f8f6f3
-
SHA512
571322371df8ee0c21c118e314ffd8299c049f7616870acc6d30ae4bcbb85a7f312d85b1db6cc89fb9b11e1fc20873809ea19b72b5cb3b05bcbc1d86c158c566
-
SSDEEP
24576:pBhEA9CBESBU1rvEQP7XaDRngG+sjzX7vG0Mh+dgUhuiiz:DhEAMBTBU1zEQra6G+2e0k+LhuR
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-