General
-
Target
JaffaCakes118_0f9aa51dd209c16c1dade86a46fa461d8a045c2350d406700864271dab631b98
-
Size
298KB
-
Sample
241229-ks7cvaxpgl
-
MD5
769f6f915d2a71bb00f041e6f90d27bb
-
SHA1
670f2d76b6caa080d0f102d0e85672a696f0d5fd
-
SHA256
0f9aa51dd209c16c1dade86a46fa461d8a045c2350d406700864271dab631b98
-
SHA512
b5d118f460ff1cf4e8791e9afaca843305f559b2eaa0a70927a66cf86e79151138bf308701a61c716045bec8c8095c34412f69f1f2a9928acdb6d72586a333ac
-
SSDEEP
6144:1Q4zwnsys/8uRpMrR0A/BdA8Wirfsy0EZFIQ3e6Fh88LpJPbjBZDc+l4ks0+:1gs/FnMN0cBdYyvi583PbjBZD5l4lH
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/j6m19kru6wpzksw.dll
Resource
win7-20241010-en
Malware Config
Extracted
formbook
4.1
ndc
ezy-kitchen.com
steedx.com
angelicacapital.com
mazinglife.com
courtmillbuilders.com
pakoussaapparel.com
thegirlamongthegirlnow.com
melaninandmarscosmetics.com
skylarfeeneyphotography.com
auto-servis.site
casnza.com
good-un.com
wonderfulwanfield.com
cumulustalent.net
cannapecbd.com
westernsocietyspot.club
021jdwx.com
parcelretail.com
lazakanya.com
muslimmediation.com
scrapnforyou.com
mygrangerwater.com
synthpatico.com
localbitcoinesa.com
ruvapy.com
saitezogmile.xyz
beautyshoped.com
clubmusicbus.com
finchhuttontx.com
tianyuanjiandao.com
toumall.net
babamlabirlikte.com
ofertasmundiais.com
ylc1992.com
winsproduct.com
tempatku.com
globalsteelindia.net
mhf-ugou-hinami.com
cntrybounce.com
thefinal7.com
rfidsystemes.com
mediastudio.digital
romanrvs.com
alibaba-venderr.rest
elenanagy.com
structura.store
hushixueyuan.com
boswant.com
tinyshopperu.com
spacecubes.group
phenix-cis.com
gissellasboutique.com
surfbestie.com
lovehoneyco.com
leoparra.com
familycvs.com
latenight-coder.com
e-baybrazil.com
escolaursamaior.com
studentpii.com
livisave.com
szsaxf.com
realworldmemos.com
twicebilingual.com
nolcra.com
Targets
-
-
Target
sample.exe
-
Size
459KB
-
MD5
06a466881eb25fe18248221687af6ab3
-
SHA1
17a3c06f08dc5610134292134baa2c4b122e3b98
-
SHA256
f8e9e0ca14f6c6759716590b8880593dc9069d7666adc8ebbbb216e7175a1999
-
SHA512
96b34326e9a8a72ace6c3b584408949f8424caf8d7bcb313a234c1452ee17c814db4277187abd1b15033064d73991bbd6db531b2ba8b0ef8f2d586398fbfbd95
-
SSDEEP
6144:o9X0GbyZbMNeq+B8r2tOVdNOQ+ZyTZt3EMNe0835iP9cMf9A+jbudLGmvtpGsEYl:e00iaeq+8mMteFpiP9jpELGmvtYnYXOs
-
Formbook family
-
Formbook payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/j6m19kru6wpzksw.dll
-
Size
6KB
-
MD5
fb719cbb8e619a0a53503d32410c099a
-
SHA1
2d6a082ec6171fa00509758b25299278d1944657
-
SHA256
1f1a183a52a36d09ce8611504ee629c7c2ef93ad1b09d32fbf2500441b41d0e6
-
SHA512
68f7d338e41ffade872c8175c0dc62dd296dccd32f9d6308bb0a407c60032877bbd5bff4af7dacbcb3fa023f285ce55935defae750ff7e2108f6ff6f5ab22077
-
SSDEEP
96:vGWc7CvrKoslKrKosdGCA+odjIMVWH7A3Fx:vGpNosZosjABd1WH
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-