Overview
overview
10Static
static
3BANK RECEIPT.exe
windows7-x64
10BANK RECEIPT.exe
windows10-2004-x64
7$PLUGINSDI...ud.dll
windows7-x64
10$PLUGINSDI...ud.dll
windows10-2004-x64
10PO.exe
windows7-x64
10PO.exe
windows10-2004-x64
7$PLUGINSDI...1h.dll
windows7-x64
10$PLUGINSDI...1h.dll
windows10-2004-x64
10STATEMENT ...NT.exe
windows7-x64
10STATEMENT ...NT.exe
windows10-2004-x64
7$PLUGINSDI...w4.dll
windows7-x64
10$PLUGINSDI...w4.dll
windows10-2004-x64
10General
-
Target
JaffaCakes118_1ebcadef0f2790a5c28cc8d6100007eb6a82a0cf7fc582e7595fa9a3407d3049
-
Size
759KB
-
Sample
241230-v6yb7s1ndm
-
MD5
61c631192561a35a471641ea076348aa
-
SHA1
f2848a5ab08673d467ecef0709b9c93f74a0aa18
-
SHA256
1ebcadef0f2790a5c28cc8d6100007eb6a82a0cf7fc582e7595fa9a3407d3049
-
SHA512
795d8401fe49a7cefd1ede1e365f030f005bad5a88db4114dafaf697ae535c94bfbe1982e47e007daf565e284596792d27af05fd4bfb55d7554d6e0b7b70dcde
-
SSDEEP
12288:Sv16UtZspy3Vb4+h+Ns47IvWNqjGb0VV5gkzuOtw8WMXah+ijknukIRC+uzg2tXz:26Q91UcjjGgD5gBOXWMXO+ijQIC+uEiz
Static task
static1
Behavioral task
behavioral1
Sample
BANK RECEIPT.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
BANK RECEIPT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/2g6ght2plrugud.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/2g6ght2plrugud.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PO.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
PO.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/k5ig8v1xqqd111h.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/k5ig8v1xqqd111h.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
STATEMENT OF ACCOUNT.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
STATEMENT OF ACCOUNT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/wfonpw4.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/wfonpw4.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
formbook
4.1
dxe
sardarfarm.com
959tremont.com
privat-livecam.net
ansel-homebakery.com
joysupermarket.com
peninsulamatchmakers.net
northsytyle.com
radioconexaoubermusic.com
relocatingrealtor.com
desyrnan.com
onlinehoortoestel.online
enpointe.online
rvvikings.com
paulpoirier.com
shitarpa.net
kerneis.net
rokitreach.com
essentiallygaia.com
prestiged.net
fuerzaagavera.com
soukid.com
moderndatingcoach.com
mentalfreedom.guru
bullishsoftware.com
sectorulb.com
outletyana.com
fptplaybox.website
artinmemory.com
buyruon.com
ljd.xyz
mondaysmatters.com
spiritsoundart.net
ixiangzu.com
lacompagniadelfardello.com
bnctly.com
sarasvati-yoga.com
0055game.com
lagrangewildliferemoval.com
umlausa.com
chaytel.com
kkkc5.com
union-green.com
philreid4cc.com
theanimehat.com
redlightlegal.com
myaustraliarewards.com
barkinlot.com
mujahidservice.online
nugeneraonline.com
sopplugin.com
makemyroom.design
ferienschweden.com
fps2020dkasphotoop.com
stylezbykay.com
royalpropertiesgurugram.com
birzulova.com
cosmicmtn.com
kissanime.press
poweringprogress.today
omsamedic.com
drunkpoetsociety.com
hostbison.com
asapdecor.com
houseofsisson.com
knighttechinca.com
Targets
-
-
Target
BANK RECEIPT.exe
-
Size
280KB
-
MD5
6317a0b98ebd6f0ba716fc1b73b4bf31
-
SHA1
6f593ad2588b2ca2e561f0b47c9654df9fd95932
-
SHA256
a2e99d0aabd8f0ad83b885eccf313563526a58b2da435bf34dad29294c712efe
-
SHA512
e29265b8cc385be1c86751dd04dd2a70d727e8e298cd0d0ca250c2c6515c8d1c189511c564de11cf9c3c85d3efed1e23f7ad4b91bcca156b6b7c4341195f449a
-
SSDEEP
6144:7PXvBKWuizHoEVrwSNvxsjZ+3Dd4ECaGbz3cA+A0MQ01:tKWNVrHNv2lM3yZ+Wf
-
Formbook family
-
Formbook payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/2g6ght2plrugud.dll
-
Size
5KB
-
MD5
64ade443342d3aa3790c2846abf93959
-
SHA1
d6668f6881d40dc3dc3d1f627f2721e1d333e698
-
SHA256
ea1deb95fa6614524006ee3260957aef27ebd563f609dde680cace5f2ea09e45
-
SHA512
2fdce6c768ded710d6d011be5317b184a09e10058145bdff545e83df63f5e0f46db4f679161174397b37d0fb2f43abe7275405845742e4a73bc6ef995edf4845
-
SSDEEP
48:aiVuJ3n1ASkT3rNDZbitP8XgRYB0K/PbKq1nh/SS72+DtMYquSzieLURuqS:/43n1ASkfNDZ+tBYB0A/2otsJzax
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-
-
-
Target
PO.exe
-
Size
228KB
-
MD5
2593eef7b38e160b9697f2479fa8843f
-
SHA1
25d4d88f321321fb5b2b316fd5dbcd5bb144daa1
-
SHA256
b35de004189f271fe754dd614e5fbbc299425f5aca9ebf1f935bf26696964853
-
SHA512
c5beb57aae9c18ca5d7d73954216abc6a07871666d08a654d7b5d8e1d25b0defe9ca66eee77325bed03870a39757c85df13f868472447369bd2903ba05336a21
-
SSDEEP
6144:lPXIegRJRwlTL8+GiAUUv5hotXkpqfc9F40:aegRJ+q+b3kpqoj
-
Formbook family
-
Formbook payload
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/k5ig8v1xqqd111h.dll
-
Size
5KB
-
MD5
fe9e8afe6e228256eaf3065c403d87bb
-
SHA1
1d46976328242b9e4f37d994bc1f169ee1f4c112
-
SHA256
e2b161127954eb1373158a95ef083d1b00198fef933e9ad5a1496d82d9006b8b
-
SHA512
573399e2885f89f05e27de783ef286c79dab04ca4e942f62ccbbb40d61fc7ab80baa97b13948b719dcae785d5daa19e4aa23adb4922e9737e0ecbfc2a09ba4a5
-
SSDEEP
48:ai7zn1ASkT3zNDZbitP8XGeHJl8gIoq1nh/SSb2+DtMYquSzieL2RuqS:/fn1ASk3NDZ+tSJKgif2otsJzwx
-
Formbook family
-
Formbook payload
-
Suspicious use of SetThreadContext
-
-
-
Target
STATEMENT OF ACCOUNT.exe
-
Size
387KB
-
MD5
5932bd9d5a231f2dce386609a1c80ba9
-
SHA1
94b257813d301d75895d0fee69a8acc224cca82e
-
SHA256
14e48e373fee4fafef99517fba97e5ea5727f764a0b92509b307f9387679dd64
-
SHA512
c10ca6caa068086aef9e36aab1ec8ae9f83367a30fa213d54fcfd5c77f0115e1b4017ddb77cf28bae3761d75ee0118241eb413613cecf4431820d526a7ba967c
-
SSDEEP
6144:7PXz3+5YKsw0UK0qAY+QUIgtTnmBuoPEhahHyHAmyiQoijPkLG:Pk0XfUZtTquoPIahiAmHdm
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/wfonpw4.dll
-
Size
5KB
-
MD5
2352a10c7c964ab3ab072f17a78cb77f
-
SHA1
a41c5d247420909bb3a3565dd552990258904f02
-
SHA256
271f00c08e8dbf27f0b36e27df2aa07be3e4492940118ae3e43758a812d7e370
-
SHA512
14634bebdd077a674b02bb9548588868ca56145e497fea67be211bd2887bec65b02c75f7edafdbff0d976ff9a424f8acc1ba0ab4244a1b86ebeb640ceb8c41d4
-
SSDEEP
48:aiGzDn1ASkT3jNDZbitP8Xr0EVg56F22/vtq1nh/SS72+DtMYquSzieLURuqS:/8n1ASknNDZ+tw0Eem2Rf2otsJzKx
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1