General

  • Target

    f0194f354acfcdef542970496608eb99_JaffaCakes118

  • Size

    714KB

  • Sample

    240415-c265fafa9s

  • MD5

    f0194f354acfcdef542970496608eb99

  • SHA1

    480b873a53ffb3c5b9bf4e710e65e94123929ae8

  • SHA256

    237a1e97a6c1bca59ddb80fd572c4f242d1fc90b0b1ad0d9996d8aba93c40b0a

  • SHA512

    590663fb62cf49e9c853c1587849a9eb516d27389e0fa2161048fd6f6a96de4670ead03b599b86451146ef6ad05bd20df9d9fc53f8de5ebdd57431f9cc87b7f7

  • SSDEEP

    12288:TL+1gBL8wX6HjpQzbnAm/XB1x4c6GdqoPl43ystsi4m+QJ9t/4gGQvcssYYO6Bya:TL+1fre5zx4c6WTO3oi

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uqf5

Decoy

suiddock.com

sweetgyalshop.com

puterigarden.com

orangestoreusa.com

prostirkarpat.com

ajierfoods.com

mindlablearning.com

factiive.net

beautifulbrokenhearts.com

direcionalreservapraca.com

tvhoki.com

themoderncoachinstitute.com

classactionwalgreens.com

haloog.com

sachinkaushik.com

daleearnhardtjrchevyvip.com

disconight.net

ocyslibes.icu

encounterfy.com

infamoudpapertrail.com

Targets

    • Target

      f0194f354acfcdef542970496608eb99_JaffaCakes118

    • Size

      714KB

    • MD5

      f0194f354acfcdef542970496608eb99

    • SHA1

      480b873a53ffb3c5b9bf4e710e65e94123929ae8

    • SHA256

      237a1e97a6c1bca59ddb80fd572c4f242d1fc90b0b1ad0d9996d8aba93c40b0a

    • SHA512

      590663fb62cf49e9c853c1587849a9eb516d27389e0fa2161048fd6f6a96de4670ead03b599b86451146ef6ad05bd20df9d9fc53f8de5ebdd57431f9cc87b7f7

    • SSDEEP

      12288:TL+1gBL8wX6HjpQzbnAm/XB1x4c6GdqoPl43ystsi4m+QJ9t/4gGQvcssYYO6Bya:TL+1fre5zx4c6WTO3oi

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks