General

  • Target

    JaffaCakes118_a49527480fd1d0c7846c40775f3a1b1f518bb1ed0b62680cd87b0d44328f9a94

  • Size

    373KB

  • Sample

    241229-3d871azpd1

  • MD5

    979a77f221d47d6d763d15c4a4a44643

  • SHA1

    2df2e287d3f08324108971f55bf8b91333de17c3

  • SHA256

    a49527480fd1d0c7846c40775f3a1b1f518bb1ed0b62680cd87b0d44328f9a94

  • SHA512

    3c58146c32e23cfc2669a108d5ff9b7c49a03d4e2e1e73be481d39673df17d0eb59e9f2c0a40835168dd9fc28df340ee8cf4877210549d6ac1616f688feed4f2

  • SSDEEP

    6144:dG72oQGwwkJjVe9aS2zxOJ/1m0kRSy2owH7NcglaHRqL5CFVKc0KVCFGO6Is6:a2tGwYaS2zxOu0kRSyz2qQ5eqjF4Is6

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    *p=N(5r?6=L*

Extracted

Family

formbook

Version

4.1

Campaign

fs44

Decoy

whneat.com

jljcw.net

pocodelivery.com

outofplacezine.com

yavuzcansigorta.com

xinhewood-cn.com

cartogogh.com

5avis.com

joyceyong.art

digitalsurf.community

blackcreekbarns.com

magazinedistribuidor.com

sportsgross.com

drevom.online

mayibeofservice.com

gareloi-digit.com

permitha.net

renaissanceestetica.com

facts-r-friends.com

dach-loc.com

Targets

    • Target

      ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f

    • Size

      450KB

    • MD5

      cd005dbadf071616082e110600abc48d

    • SHA1

      c111f671078a2fc46ec46c501e96079cf97e10c7

    • SHA256

      ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f

    • SHA512

      d1960751778de17ee541669a51c0c7ea7a007af39fb5a957cb28f08d02819b08ce417c24e1f8b83e401ab2dd5cbd524b2ba1e1b83cf1d1f75291aff52b8af87c

    • SSDEEP

      12288:ifH22qla5w/yXbx+DbZ83FLDqqC5l/40PVc:ifH0MW/Ibx+DbZ83pqp5l/

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Blustealer family

    • Detect PureCrypter injector

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook family

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Purecrypter family

    • Formbook payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks