General

  • Target

    e8ffcbc409061c90c88be282c1b8b0d0_JaffaCakes118

  • Size

    843KB

  • Sample

    240409-cwgbtsfc6v

  • MD5

    e8ffcbc409061c90c88be282c1b8b0d0

  • SHA1

    84ff0763b0464abd121f06599cf3c5ee739fa3f9

  • SHA256

    93e54839118561584c3e736d6b03acfbec1373cfe5b9b9dffdb3d57e96be7d4a

  • SHA512

    e3b8c38d8cbfcefa876b5055eb1dce48f261eca1f8ab32d6ac8cb559389ba5700cdef8e5f382b408a1fb1e1c9cfc03ba9fd05d92feef5358a1f2aca1efc2e1b3

  • SSDEEP

    24576:dw2KSb9kgF16bJtrEMYPzPeglLG6EmdG9tMRdbur:bKykk4AMYPzGV7MRdq

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n58i

Decoy

nl-cafe.com

votetedjaleta.com

britrobertsrealtor.com

globipark.com

citysucces.com

verisignwebsite-verified.com

riddlepc.com

rosecityclimbing.com

oleandrinextract.com

salmankonstruksi.com

needhamchannel.com

refreshx2z.com

youth66.com

pla-russia.com

halloweenmaskpro.com

exdysis.com

1gcz.com

lookgoodman.com

rlxagva.com

stlcityc.com

Targets

    • Target

      e8ffcbc409061c90c88be282c1b8b0d0_JaffaCakes118

    • Size

      843KB

    • MD5

      e8ffcbc409061c90c88be282c1b8b0d0

    • SHA1

      84ff0763b0464abd121f06599cf3c5ee739fa3f9

    • SHA256

      93e54839118561584c3e736d6b03acfbec1373cfe5b9b9dffdb3d57e96be7d4a

    • SHA512

      e3b8c38d8cbfcefa876b5055eb1dce48f261eca1f8ab32d6ac8cb559389ba5700cdef8e5f382b408a1fb1e1c9cfc03ba9fd05d92feef5358a1f2aca1efc2e1b3

    • SSDEEP

      24576:dw2KSb9kgF16bJtrEMYPzPeglLG6EmdG9tMRdbur:bKykk4AMYPzGV7MRdq

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks