General
-
Target
JaffaCakes118_a49527480fd1d0c7846c40775f3a1b1f518bb1ed0b62680cd87b0d44328f9a94
-
Size
373KB
-
Sample
241229-3d871azpd1
-
MD5
979a77f221d47d6d763d15c4a4a44643
-
SHA1
2df2e287d3f08324108971f55bf8b91333de17c3
-
SHA256
a49527480fd1d0c7846c40775f3a1b1f518bb1ed0b62680cd87b0d44328f9a94
-
SHA512
3c58146c32e23cfc2669a108d5ff9b7c49a03d4e2e1e73be481d39673df17d0eb59e9f2c0a40835168dd9fc28df340ee8cf4877210549d6ac1616f688feed4f2
-
SSDEEP
6144:dG72oQGwwkJjVe9aS2zxOJ/1m0kRSy2owH7NcglaHRqL5CFVKc0KVCFGO6Is6:a2tGwYaS2zxOu0kRSyz2qQ5eqjF4Is6
Static task
static1
Behavioral task
behavioral1
Sample
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
*p=N(5r?6=L*
Extracted
formbook
4.1
fs44
whneat.com
jljcw.net
pocodelivery.com
outofplacezine.com
yavuzcansigorta.com
xinhewood-cn.com
cartogogh.com
5avis.com
joyceyong.art
digitalsurf.community
blackcreekbarns.com
magazinedistribuidor.com
sportsgross.com
drevom.online
mayibeofservice.com
gareloi-digit.com
permitha.net
renaissanceestetica.com
facts-r-friends.com
dach-loc.com
thezuki.xyz
cerradoforte.com
yunjin-band.com
soleirasun.com
stoneyinsideout.com
a-sprut.store
verdistar.com
hivingly.com
trywork.net
bvpropertymanagement.com
calibrationprofessionals.com
mpalmcoffee.com
polygons-stakes.site
themomerator.com
payrollserviceform.com
luyensex.club
elon-drop.net
bluechipblog.com
suaempresaemcasa.com
experimentalcircus.art
vietnamesecuisines.com
i4zlyv.com
b23q.xyz
quantumap.com
sana-poratal.site
eastcoastguardfl.com
maxwell-caspar.com
pontochavelocacoes.com
nitsmm.site
tiffanyrockdesign.com
dgmlsubscribers.com
cybericonsultancy.com
bankssy.com
cxitsolution.com
summerinthepark2022.com
chainadmere.com
quangdecalshop.com
winagency.net
motorworks.tech
huefa.club
mthoodviewlodge.com
bahisaltv79.com
codeforge.pro
dpd-gasplumbingandheating.com
echoesdesing.com
Targets
-
-
Target
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f
-
Size
450KB
-
MD5
cd005dbadf071616082e110600abc48d
-
SHA1
c111f671078a2fc46ec46c501e96079cf97e10c7
-
SHA256
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f
-
SHA512
d1960751778de17ee541669a51c0c7ea7a007af39fb5a957cb28f08d02819b08ce417c24e1f8b83e401ab2dd5cbd524b2ba1e1b83cf1d1f75291aff52b8af87c
-
SSDEEP
12288:ifH22qla5w/yXbx+DbZ83FLDqqC5l/40PVc:ifH0MW/Ibx+DbZ83pqp5l/
-
Blustealer family
-
Detect PureCrypter injector
-
Formbook family
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Formbook payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-