General
-
Target
JaffaCakes118_f628fba1c3baac9d0485cf036248f3918a5c1f1741d18fb5c13f077f70e1ee11
-
Size
207KB
-
Sample
241226-wcn24ssqhs
-
MD5
9013c065dfeee8b06150a355ae65b4d2
-
SHA1
6e5786846c5b0836d98f218158cdf99e46b8d852
-
SHA256
f628fba1c3baac9d0485cf036248f3918a5c1f1741d18fb5c13f077f70e1ee11
-
SHA512
41d77bd5eb80d54474613d21725a6b2a5cd7173e4a0cf24bd68a7d4f34ce6822bb5280138bd11cc476c2bada2f6169526e256e25baf767afd4ac802872543f14
-
SSDEEP
6144:NKhBP3TPN1yGWLlecZwAZxeTclWcKqFtM:NMBLP+GnUqTrcpFK
Static task
static1
Behavioral task
behavioral1
Sample
oaieFYV.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
oaieFYV.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hmyvjhoqve.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
hmyvjhoqve.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
4.1
oi57
brave-offers.com
holodeath.com
wangzhanlishi.com
themeparkoutfitters.com
7letterspro.com
n8u9hm.xyz
invoicemojo.com
quwokau.art
propertycaretaunton.co.uk
waterpurificationguys.com
iracingf3setups.com
socialbutterflyllc.com
bankid.site
alexscraftsmandesign.com
diamondshop.info
cybersamurai42.com
isippets.com
louareafantasy.com
thebookdealer.co.uk
les-celestines.com
shopilift.com
bedrockmortgages.co.uk
caributupetu.xyz
amazonashospitalar.com
librarealstate.com
juliapet.xyz
banske2.com
yuxincheye.com
uawelcome.online
clarksinnsuites.com
agustoskampanyasinatikla.com
appcloudstore.biz
stormtoy.com
smartbeauty-clinic.com
ranunculaceaemonopodial.beauty
1924biglick.com
hoiquancaudai.com
theharbor.finance
sandysbiryani.com
jvn5.com
pooyaflight.com
louezvotrepiscine.fr
visasafir.info
5sj512.com
zkappex.com
rimissneaker.com
19950322.xyz
166440.com
speedupsm.com
austinlong.info
yourwingtips.com
max965.net
beautyinyah.com
lancedigital.online
anim8stories.xyz
agpackvas.com
jaiswalbusinesssolutions.com
animeno874.com
jeffreyventrella.com
isososo.com
ecordings.com
miesxon.online
zengyiran.xyz
noboadental.com
shopmzbeauty.com
Targets
-
-
Target
oaieFYV.exe
-
Size
244KB
-
MD5
d8be70132f0b64b10f8b9e2fafdaf7a4
-
SHA1
a83a64696c9872f94fa5ddb592113142845470e6
-
SHA256
ae3f17f0d32a8d4f5e5095108f2f0168755351b4cf1d415fa5c3d953872f990b
-
SHA512
cc33bef65a281b06a595a64736481fd87cf2615a0504b698268663cfc20e60af93e1a0976c97f813187ed01b212bfac2166d0f72626c82e7713979cdae77587b
-
SSDEEP
6144:5weEfHdpdgNEov9JAATML4EVzMRYUBalUCAxs0Qch:adpdxov9/fEVzDlf+NQ+
-
Formbook family
-
Formbook payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
hmyvjhoqve.exe
-
Size
6KB
-
MD5
6b668312b1fc254abf6998f94b7698ad
-
SHA1
f6f70ca64564c0460bfd433c61d567e2188259fa
-
SHA256
12a5d66b2147569c4bb95fc174dd277b1e9ae75dbc3934075f22bace2246fe06
-
SHA512
4f637f37aa50f2f715a48650e1dfe22dbc36bcee71ac6abd6a3d84a349d6c0bdda591daceab8d981c91a25d1286f0e3d890496ac5243d3424b01bdf12d05a3ee
-
SSDEEP
96:3Igh8GC7hbTAW4IdpYEW+4oyn0Tv9u5bnx:4JGCr4IdpYF+4oyn04
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-