General
-
Target
JaffaCakes118_87f8354a4aa0548f3bfceba73dc020e8160ad89f1c8b5e41d53f7457c8ba8b93
-
Size
359KB
-
Sample
241230-3msavaxjfy
-
MD5
51317f8895f383675f74597fbb17c8d4
-
SHA1
e90eed2bb150680f5ecea58c3f9cc09cdf295ce2
-
SHA256
87f8354a4aa0548f3bfceba73dc020e8160ad89f1c8b5e41d53f7457c8ba8b93
-
SHA512
cd5b23034d223cbb68fc7440c5ecdf9dc7506e7eb301b68a0a2251a088304b87f1360bd08002c33f04e7dc6cc1930e87b9052b3b31f369a415f5a6d28702e234
-
SSDEEP
6144:VE6nbe9BVtxfeMbTXYEcJ00PV5C9fu3DUuY5FrTQQDmnK0WlxzhV1ZAWA1:m6kVtV33IEc00PP3XY/QQIK0WldhBA31
Static task
static1
Behavioral task
behavioral1
Sample
0CT2020PI.exe
Resource
win7-20240903-en
Malware Config
Extracted
formbook
4.1
wt6
mdjbjsc.com
twosparrowslsbusiness.com
captipe.info
spirtofafrica.com
teacher4today.com
d9masks.com
americanveteransparks.com
originvinylvermont.com
lifeguardboat.net
neynunescuritiba.com
4activelife.xyz
tiniytie.com
schirmenworld.com
nogbeter.com
bikerm.com
higherpurposeproject.com
melloband.com
cremgrs.com
chengyuanwai.com
multiplewealthsecrets.com
77ren.com
freedomwonks.com
tastethe.cloud
busty-italian.com
bingowheels.com
asmarasefera.com
snusmumriken.net
elearningdidatticaadistanza.com
tropicpendants.com
59dzb.com
hopitaldefrance.club
huanxifaka.com
precisioncoffeetools.com
skinjunkyph.com
littlebitlessrisky.com
freethegameboy.info
justiciaabogados.com
harumiyamanaka.com
alexisbekker.com
elzurrondgs.com
becurious.cloud
laeducacionadistancia.com
qualimproov.com
tregroespantry.com
la-voix-des-anges.com
supertron.online
5895hwy93s.com
eliosglaucoma.com
home-business-wealth.com
5gusaphones.com
sweetpeashihtzu.com
mrhadick.com
pizzeriavogelgryff.com
paraneon.com
massagecenterinkarama.com
votececilia.com
krcarts.com
shalagreen20yahoo.com
bird182trading.com
gjjt2019.com
casperbackup.net
usquite.site
postalpoet.com
oneagencyinc.com
ithomar.info
Targets
-
-
Target
0CT2020PI.exe
-
Size
449KB
-
MD5
0323276cec08509c8e789d02a72e91f6
-
SHA1
42e777f48b451e11bdc6a94966402318c30e1e18
-
SHA256
42e9c8cb3f59920b9ba876d6ada4d7a23c4feea3bfd5d93e6758da2ab1d470c5
-
SHA512
6e2d59de9016ef9e37ae76d1d94091c95a0b523c113d3b346b523ec788b4d0c596130c4ba76cab1729e50302cb25845d47be7d76b033c39b1b88f5bda3f25b0d
-
SSDEEP
6144:SqoZ0sHMGbBUkuetgzBgj8XG4p4Ir8ZOCfdaDe2ji7qK1GPxL1+zfZCpPnpmwuFs:SqoOT94IrQ5dFWif1GpL4UaSZNL
-
Formbook family
-
Formbook payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2