General
-
Target
JaffaCakes118_9ffd8f5cd26f82289e8f54da8894460401044c0e8506a97a016bda281458d732
-
Size
243KB
-
Sample
241230-blws4asqhn
-
MD5
5514ef534e111eb4e6ad8b8617d1a5a2
-
SHA1
a71e3bc5f02331493e46467c3c399c2688f68985
-
SHA256
9ffd8f5cd26f82289e8f54da8894460401044c0e8506a97a016bda281458d732
-
SHA512
cb2505c2a3a4166571969c3fe72c98d6dc0c90004839e7c9d4032522490cc10dfe2ab5e9069dd2850cbb4bc67527d9ce53346b0a903daf9bdc3ddc6761bdf317
-
SSDEEP
6144:HowmKyAPpDV1SFQBF9yj7fve5uW+6VyuKd9aZ1:Iw7xMQBzKjW5uh7o
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
yzoczjnuz.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
yzoczjnuz.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
avcn
iQqc+b5jHA+W
gCI4O82LSsNA9tLkneHk6qA=
3I2qv1ZVYff+1Eo=
1YmmfbWjsiHmYcYjSVTf
NBsHMXP19khOJt2KMTEHhw==
phGkJ+uyWGow/gNhAcfxpNU4GLuUgXFcOg==
76S4kOajAII72kw=
YuoJB0X0+/LJtxIjSVTf
dfwI3SsaGogqBAZ4xhUx4B2g+LiF8XoFNA==
DPZ6AvfogdqUiZUq5K+3Jqk=
hnICZyINthreqpPpaLz9gQ==
yVh1ZpxISCr6h8b+MA==
/8Tg3VE+R7A/Bte6oC7kz/g4mz8Ufa4=
Nb5SuHlc+kxwGO5Oig5THgechA==
/NLWvgr7IAXcxzuueX/s6wJXODEI
/niFcKdVbQHAqH2y
Gac4n4YyRhvRYuK6
RtRr4pSUsjjOu7qsuv9FFBTuiHQ=
u1p5bblp59M=
qmh/ZV4PTj/IiNezISd2YeWw
OytJIyQdrqsi7m1+w0DnHgechA==
pnKGf31wEhjRYuK6
/sRZ7b6DEpWbNB8u7Lo=
ZfusFJWY0sF3VehQFSB2YeWw
GQEc9xj8ALmIcaFKcbI=
N63JmIB6FAuYatG4Ky12YeWw
Y/oM545ahn1BIJGlJC0vmA==
hSQ98e3sgOCmfGCeGCZ2YeWw
hTxZQoQ4Oif2zuXFvwkz2Ws0mD8Ufa4=
MZwxv8QDB+SL
kR3PK7hq/FPFoAp7P1E156E=
KqbM38c7HCKc
ZyDDBphO+nLfpQJoLiZ2YeWw
8l3oTRsQmYgVDfgqpHh2YeWw
xGr+g5RCTvf+1Eo=
UiJES+TuCY0HxqvhaLz9gQ==
qlKwKsjVpbqMZdA07ro=
tZqxjKSBXj1m6UBqIyZ2YeWw
f0RbT0k2oJdTNZbGiZnRe72cMdJuoqY=
PuWO3V1SXvf+1Eo=
GMLNsatjHA+W
MZC5jMWKm2DVrHS0JCV2YeWw
oUvubC/lT/CAZA==
5IabgcKHwqMc4Uwsi5M+Mef1klAA
GfOM+3RshFEiCIPwvMwyWQC6
V+Jz47KPEQZ6USBXigxRHgechA==
Ugie8sS3YKUeq8rwKQ==
w1FwZYyFGBnRYuK6
+HEY0y08YRAV9WKZP1E156E=
COLu4k5TYPf+1Eo=
ZgkmM7fE6bB9Hcg0YKs=
dxKYApZRAGUAq8rwKQ==
z1vqdH0oSRuwhAiIxlE156E=
IOHv+EM6eWYp5fFfX6s=
oz1hQZOawZhvXtFq1aR6PeasvHw=
9XqNg9rU/MipiaFKcbI=
7I4tmFb/jxzxeagRR6DX
Ow4i+gq5sJZ4UVE7aLz9gQ==
8NrgwgbLuYdYMUA4aLz9gQ==
pFjuNDi9Uqceq8rwKQ==
VhYzA1JIX/f+1Eo=
fjYXhj7IBuDRYuK6
O8TR12YcvUICzbojSVTf
+eLxuLJmrwWzemjF/0xYHgechA==
suntechgadget.com
Targets
-
-
Target
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].bin
-
Size
258KB
-
MD5
1ec9c287f61dee3f7cee2dc216e8596f
-
SHA1
2ce2bc72b3245447687fddc717dbc087573e9422
-
SHA256
0112b086f601e1d8a6d10ce4e798dd5eaf379127cb99d5a4b4f44ec708457ffd
-
SHA512
74568e623eec50754c1a0cf3e2db27e120777f8c80a80df94fac6f106b5b43d7a8a0f9b5375f86bdbc8122d49eac2127bb9167f2e6a7d658f2e9302fe8ab69e5
-
SSDEEP
6144:mbE/HUba5PBYCt37k0AUck3UcrhNQxy7bjTRuFsC42TjKoagrM0:mb/aLPtLk9rkEcrkxey82TjKzyp
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
yzoczjnuz.exe
-
Size
59KB
-
MD5
60ebe600e2d67c0877426dfd53be96d7
-
SHA1
83c0f3f77bec5df19f20ab0706ca736bd5e6e0d6
-
SHA256
fad978413cf6a36fbd03d3c96a5a08d0cf227e17710abddc06e73ae1913de648
-
SHA512
f0e2839211d84f2247a654f51ff07fe4c89f3d9ed71558e34479d8afe08aa9f606a65d1e53eaa0bea8287537de8f7e50427402f33a0339739b4dff7405a127eb
-
SSDEEP
1536:WgvtLu0ZssXg2J2m3K5n2ETMCZQsuyXn5QnQC:WACsPEvMCi32nCnQC
-
Formbook family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-