General

  • Target

    f866a06214ff680e7d9f586a8d6a84f5_JaffaCakes118

  • Size

    694KB

  • Sample

    240418-vjdpaaab23

  • MD5

    f866a06214ff680e7d9f586a8d6a84f5

  • SHA1

    e835c54d53c216a7e4b0743bffe37fb58bf66e72

  • SHA256

    39fc8ada09fdee11dac8fbb0236624c2d5dcf2b66d8f2aa4bbcdeada6de6206b

  • SHA512

    9e207618b176e3301518eba958fa0eac1e4d434744a883bd6481ef364a67a72dd78b657d63783b0ac1524c996511b4557d6af18236a9b0ba23ce1599543675c1

  • SSDEEP

    12288:21Wl8TpUMxskWv6VfuEPECDMmZXSJpBRR3QxZ:2AGR0yUExx+Cf

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

usvr

Decoy

theblockmeatstore.com

drone-moment.com

srsfashionbd.com

kylayagerartwork.com

instagrams.tools

rosenwealth.com

indicraftsvilla.com

rswizard.com

irist.one

pubgclaimx14.com

thegeorgiahomefinder.com

unusualdog.com

kifayatikart.com

methodunit.net

bavarian-luxury.com

17391000.com

ipcsaveday.com

yael-b.com

pasionqueconecta.com

youngsvideography.com

Targets

    • Target

      f866a06214ff680e7d9f586a8d6a84f5_JaffaCakes118

    • Size

      694KB

    • MD5

      f866a06214ff680e7d9f586a8d6a84f5

    • SHA1

      e835c54d53c216a7e4b0743bffe37fb58bf66e72

    • SHA256

      39fc8ada09fdee11dac8fbb0236624c2d5dcf2b66d8f2aa4bbcdeada6de6206b

    • SHA512

      9e207618b176e3301518eba958fa0eac1e4d434744a883bd6481ef364a67a72dd78b657d63783b0ac1524c996511b4557d6af18236a9b0ba23ce1599543675c1

    • SSDEEP

      12288:21Wl8TpUMxskWv6VfuEPECDMmZXSJpBRR3QxZ:2AGR0yUExx+Cf

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks