General

  • Target

    ee10aa40ce9a309ed5311465c3c8ccae_JaffaCakes118

  • Size

    993KB

  • Sample

    240411-w2tc5acf7t

  • MD5

    ee10aa40ce9a309ed5311465c3c8ccae

  • SHA1

    42f88403038ed536fa7338b8613ad5e790e4295d

  • SHA256

    f7c1ecf2c6e90d8a9a0ac0972b0ab02ca809a85da65d51b46f56a4c81cc4996e

  • SHA512

    4904e4125a8e07b94314d899418d0a0b809108f6597796a0693ab8770c78113507e1c94449141254c94471f91bc481ab6b903437fbc0d32ba8ee6f6abf316867

  • SSDEEP

    12288:XbWmOYtLmS5fm1/mDDc9F3nC0Py3gAh46gsCipjave3cJ/5u0towdiYcbhSBmE/f:XhyANgRi8Y05hFbz8XR3O

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ssee

Decoy

portalcanaa.com

korzino.com

dlylms.net

smartearphoneshop.com

olimiloshop.com

auvdigitalstack.com

ydxc.chat

yhk868.com

lifeinthedport.com

self-sciencelabs.com

scandicpack.com

hold-sometimes.xyz

beiputei.com

yourrealtorcoach.com

rxods.com

fundsoption.com

ahlstromclothes.com

ksdieselparts.com

accountmangerford.com

kuwaitlogistic.com

Targets

    • Target

      ee10aa40ce9a309ed5311465c3c8ccae_JaffaCakes118

    • Size

      993KB

    • MD5

      ee10aa40ce9a309ed5311465c3c8ccae

    • SHA1

      42f88403038ed536fa7338b8613ad5e790e4295d

    • SHA256

      f7c1ecf2c6e90d8a9a0ac0972b0ab02ca809a85da65d51b46f56a4c81cc4996e

    • SHA512

      4904e4125a8e07b94314d899418d0a0b809108f6597796a0693ab8770c78113507e1c94449141254c94471f91bc481ab6b903437fbc0d32ba8ee6f6abf316867

    • SSDEEP

      12288:XbWmOYtLmS5fm1/mDDc9F3nC0Py3gAh46gsCipjave3cJ/5u0towdiYcbhSBmE/f:XhyANgRi8Y05hFbz8XR3O

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks