General

  • Target

    6b2820ea47559925d86ee665e92a111e_JaffaCakes118

  • Size

    560KB

  • Sample

    240401-hvd3zagb4z

  • MD5

    6b2820ea47559925d86ee665e92a111e

  • SHA1

    0e7e5adad12e3b3979ad9d9e1ef854d745c6f629

  • SHA256

    de12f96f01168f625165bda83f4d556d00d6c473e61aa5c6f424aed07ae9cc04

  • SHA512

    66281b9b82368fefc29ff622561817d9011e0dee684fdd300dd9d7a49161de305916effcfb0e27dc2c16e7fe2dde4ce3f8489d2629de3a25af5c6a1e72082a41

  • SSDEEP

    12288:mhvrUtBHpNx6trWJc9h4OP4W4Cm5G1PQzLR80:eDUtdnxgrW+1+xQ14F8

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

b5ce

Decoy

advellerd.xyz

giasuvina.com

arab-xt-pro.com

ahsltu2ua4.com

trasportesemmanuel.com

kissimmeesoccercup.com

studyengland.com

m2volleyballclub.com

shyuehuan.com

elsml.com

blog-x-history.top

coditeu.com

allattachments.net

vigautruc.com

mentication.com

zambiaedu.xyz

filadelfiacenter.com

avlaborsourceinc.info

tameka-stewart.com

studio-cleo.com

Targets

    • Target

      6b2820ea47559925d86ee665e92a111e_JaffaCakes118

    • Size

      560KB

    • MD5

      6b2820ea47559925d86ee665e92a111e

    • SHA1

      0e7e5adad12e3b3979ad9d9e1ef854d745c6f629

    • SHA256

      de12f96f01168f625165bda83f4d556d00d6c473e61aa5c6f424aed07ae9cc04

    • SHA512

      66281b9b82368fefc29ff622561817d9011e0dee684fdd300dd9d7a49161de305916effcfb0e27dc2c16e7fe2dde4ce3f8489d2629de3a25af5c6a1e72082a41

    • SSDEEP

      12288:mhvrUtBHpNx6trWJc9h4OP4W4Cm5G1PQzLR80:eDUtdnxgrW+1+xQ14F8

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks