General

  • Target

    fc610878793ee9ee26ed44da1549f4f8_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240420-krypbach74

  • MD5

    fc610878793ee9ee26ed44da1549f4f8

  • SHA1

    118b1e549ede5ef330a439a0c6ff0c0ffe043f69

  • SHA256

    5c8d039da52a39b80531b80b28e53060c2bfefb747ef5477d100bb3c819c089b

  • SHA512

    235c6a03d7afef21de7e0fb35989b57307696aed41a12082c4c64ffb594f6a6e75835b23c511be8a7becc53e507674354f331673e49aeb5062a1c8c5cd4bb742

  • SSDEEP

    24576:UwXF5LWoQyFY3blhB26grF6QaXMkYKzyA/JT:7XdyL126grF6Qa8gzyiJT

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wufn

Decoy

rsautoluxe.com

theroseofsharonsalon.com

singnema.com

nathanielwhite108.com

theforumonline.com

iqpt.info

joneshondaservice.com

fafene.com

solanohomebuyerclass.com

zwq.xyz

searchlakeconroehomes.com

briative.com

frystmor.city

systemofyouth.com

sctsmney.com

tv-safetrading.com

thesweetboy.com

occulusblu.com

pawsthemomentpetphotography.com

travelstipsguide.com

Targets

    • Target

      fc610878793ee9ee26ed44da1549f4f8_JaffaCakes118

    • Size

      1.1MB

    • MD5

      fc610878793ee9ee26ed44da1549f4f8

    • SHA1

      118b1e549ede5ef330a439a0c6ff0c0ffe043f69

    • SHA256

      5c8d039da52a39b80531b80b28e53060c2bfefb747ef5477d100bb3c819c089b

    • SHA512

      235c6a03d7afef21de7e0fb35989b57307696aed41a12082c4c64ffb594f6a6e75835b23c511be8a7becc53e507674354f331673e49aeb5062a1c8c5cd4bb742

    • SSDEEP

      24576:UwXF5LWoQyFY3blhB26grF6QaXMkYKzyA/JT:7XdyL126grF6Qa8gzyiJT

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks