General

  • Target

    59d153e8d573533a302a23a00171ce27_JaffaCakes118

  • Size

    601KB

  • Sample

    240719-bbdvjaybje

  • MD5

    59d153e8d573533a302a23a00171ce27

  • SHA1

    c8fa082c4715a0b06f9775b31ce1ed3d5df380d4

  • SHA256

    e393b4fb7fdbf21f1455f58a7f7c94dd809b05563bc5a6e8f7a9ac62e96a1df4

  • SHA512

    df9dd200b735b6438590127600bf81db4ece6b9fad2e5ebaeece4c1a5663428ac5f101ad8ecd19f184cad8323ad26d54c2109c161cf0460c657595ebeecbdcc9

  • SSDEEP

    12288:I5pKf6nQG0Xx6qOAfKqjnw8PjSmkkUWsn3aSG:IKfcQG09fKqFrBkZnnC

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

im9n

Decoy

amythystbyashley.com

vaxxedfr.com

satucunghoada.com

bringmystorage.com

akapamata.com

primeworldgroup.com

aninda.tech

soundfoamguys.com

sakura.services

theglobalconversations.com

cafe-genova.com

diffuse-expected.com

didakticalaboratorios.com

plantsenliving.com

designdtc.com

uibizz.com

safficient.com

agrahotelbooking.com

money-back-financial.com

fatr555.icu

Targets

    • Target

      59d153e8d573533a302a23a00171ce27_JaffaCakes118

    • Size

      601KB

    • MD5

      59d153e8d573533a302a23a00171ce27

    • SHA1

      c8fa082c4715a0b06f9775b31ce1ed3d5df380d4

    • SHA256

      e393b4fb7fdbf21f1455f58a7f7c94dd809b05563bc5a6e8f7a9ac62e96a1df4

    • SHA512

      df9dd200b735b6438590127600bf81db4ece6b9fad2e5ebaeece4c1a5663428ac5f101ad8ecd19f184cad8323ad26d54c2109c161cf0460c657595ebeecbdcc9

    • SSDEEP

      12288:I5pKf6nQG0Xx6qOAfKqjnw8PjSmkkUWsn3aSG:IKfcQG09fKqFrBkZnnC

    Score
    10/10
    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks