General

  • Target

    1fe6bb3b680c6b3efe92374bd5ea8b85_JaffaCakes118

  • Size

    327KB

  • Sample

    240329-mrkhssfh64

  • MD5

    1fe6bb3b680c6b3efe92374bd5ea8b85

  • SHA1

    356c0cc6df02a6fa30705e918141186bd0c78475

  • SHA256

    a63e0773595f36b7ada59361abb3b0df6bf684188170da64325f7224265ecc62

  • SHA512

    a1c8cd4bf5527facfb859fb9b29c24f4f62246a17bbedfab52f09c9ef1f59c4ac57c03e776da67055dbfc3911e0e81ae36a5fb7158a2c55fb1d17ab9af6f5e41

  • SSDEEP

    6144:yi5p3b2jrxbtDD0egeAAFB7BGzGFfK8qfHFdJGfk6LjfMkhB:yievXDD0IPFfK/fHHJsLjESB

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      1fe6bb3b680c6b3efe92374bd5ea8b85_JaffaCakes118

    • Size

      327KB

    • MD5

      1fe6bb3b680c6b3efe92374bd5ea8b85

    • SHA1

      356c0cc6df02a6fa30705e918141186bd0c78475

    • SHA256

      a63e0773595f36b7ada59361abb3b0df6bf684188170da64325f7224265ecc62

    • SHA512

      a1c8cd4bf5527facfb859fb9b29c24f4f62246a17bbedfab52f09c9ef1f59c4ac57c03e776da67055dbfc3911e0e81ae36a5fb7158a2c55fb1d17ab9af6f5e41

    • SSDEEP

      6144:yi5p3b2jrxbtDD0egeAAFB7BGzGFfK8qfHFdJGfk6LjfMkhB:yievXDD0IPFfK/fHHJsLjESB

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks