General

  • Target

    3c946c79011a90ee600de3b45f591663_JaffaCakes118

  • Size

    282KB

  • Sample

    240712-jwftmaxcmb

  • MD5

    3c946c79011a90ee600de3b45f591663

  • SHA1

    e592ce3919073c0f2215b4fcc98de59a1f59c577

  • SHA256

    243b8fc6ed8a4be1109fef481d20293405c4dd9614f3f4e78debfaefb2d18137

  • SHA512

    e27524e663d9a42d6041bb7188251daff6f054923b41838adb0c99a466496a019dc6f3bc231eaef06cf461e705e22e68812496df83ccdb0d6d57cbd1bc71e75e

  • SSDEEP

    3072:HBkfJpRXATwMdFCcmbA94/P32S+INSyftupOxoit6HC77zaDrxehjkEXdN9Nt:HqjIeA94HDN8pOOM6HCmDQkIPnt

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

gzcj

Decoy

localzhops.com

cfsb114.com

sweetiefilms.com

cyclewatts.com

bubblesportsevent.com

halloween-r-us.com

rcdzsm.com

reelatioens.com

uniquegranitebenefits.com

chainlinkdex.com

topcoolhlist.com

ivy-apps.com

shopmajesticqueendom.com

ddiesels.com

ventajuguetessexuales.online

daylight93245.com

heiyingxitong.com

personalfashion.guru

usadrugfree.com

beyondcareersuccess.com

Targets

    • Target

      PO-090221.exe

    • Size

      221KB

    • MD5

      ca11f896143acf2168b383b5532ef812

    • SHA1

      fe4cf4a32e0633b9e47869a0850369c7854ec6d7

    • SHA256

      1fa8e3489567519f9ed48d1323d7316118bfd2f5f6434a942202e4ccc64f8fbf

    • SHA512

      c2d103eefae3afc47eec34210b3aa90283c13f9819c328334474caee8e0ea68dd17e6daa623fdb22af824c14083f53acdb37af84d189820b0406d52bfec41ee4

    • SSDEEP

      3072:oBkfJpRXATwMdFCcmbA94/P32S+INSyftupOxoit6HC77zaDrxehjkEXdN9Nt:oqjIeA94HDN8pOOM6HCmDQkIPnt

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      fccff8cb7a1067e23fd2e2b63971a8e1

    • SHA1

      30e2a9e137c1223a78a0f7b0bf96a1c361976d91

    • SHA256

      6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e

    • SHA512

      f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

    • SSDEEP

      192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4

    Score
    3/10
    • Target

      yrcvb.dll

    • Size

      11KB

    • MD5

      ce58ee918da61b9ad6d17ea883108b75

    • SHA1

      ba22489f71b94f0593bb02a89668aa293ce4ca8b

    • SHA256

      1175fe7473ab4675f5197a3a5271c095f2a0ad01ee5e55a728c0f208adaeef01

    • SHA512

      fa452aeffcb848f4e62a7f3df2ae10dfdc75bb49e3b80e8af076056ea648b438a98a625d951c4b769cc2ffa85742d150aa45290749779dbdc7005bbacdd0ef7a

    • SSDEEP

      192:ZI8C/wIQVYQYjRz9D3z6w0zUJIfEairMoHO+EaXLAg:ZK/wIQVYtDmwq+IfC4+EaXL

    Score
    3/10

MITRE ATT&CK Matrix ATT&CK v13

Tasks