General

  • Target

    78446f2196f6056a03cd4b4c838ec6a9_JaffaCakes118

  • Size

    880KB

  • Sample

    240401-x1jyqsdf47

  • MD5

    78446f2196f6056a03cd4b4c838ec6a9

  • SHA1

    756802eb96f3b9fba1f27cfbb22b8fe72dcec144

  • SHA256

    44c0043b7e3ae7cb7c13690875d6a2adda546b3b309b0504b233ce4c7d8d80d5

  • SHA512

    0854d09d785ed6ecf6d920b047d9f3694b42aa293a4b7d3dc2187f25842aec0fd8798e57d6cefa83845354fd29195bf9bd9390531784eab662bb9eb09e7968d7

  • SSDEEP

    12288:6Z29BixhVItvNBOFfQwG4z0y4j2LU7/Te32qU5u7FCme3TvGXKmzEEwrxYvWMwK2:6/xTItF8FJzZ4yLATe3pY3DqauEE4x

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      78446f2196f6056a03cd4b4c838ec6a9_JaffaCakes118

    • Size

      880KB

    • MD5

      78446f2196f6056a03cd4b4c838ec6a9

    • SHA1

      756802eb96f3b9fba1f27cfbb22b8fe72dcec144

    • SHA256

      44c0043b7e3ae7cb7c13690875d6a2adda546b3b309b0504b233ce4c7d8d80d5

    • SHA512

      0854d09d785ed6ecf6d920b047d9f3694b42aa293a4b7d3dc2187f25842aec0fd8798e57d6cefa83845354fd29195bf9bd9390531784eab662bb9eb09e7968d7

    • SSDEEP

      12288:6Z29BixhVItvNBOFfQwG4z0y4j2LU7/Te32qU5u7FCme3TvGXKmzEEwrxYvWMwK2:6/xTItF8FJzZ4yLATe3pY3DqauEE4x

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks