General

  • Target

    bc525d61492045490d2881099da3b8c4_JaffaCakes118

  • Size

    981KB

  • Sample

    240823-sygy5svdrl

  • MD5

    bc525d61492045490d2881099da3b8c4

  • SHA1

    84f2c141d5edf7e0d7d3ff021272aad17c100705

  • SHA256

    e2f640f8cdc89a54ecd8d1a0c8d4b8a4d1e6560f086fd82d05e0010d95a1d9e9

  • SHA512

    ee7e7bf3422597f784d905e6329e4e8ba0746859d84dcbeeece885283f76c3260c1b687e0f0840d15a96c2c50d1b029931b59491f20c950173e20ac639b65297

  • SSDEEP

    12288:jWMJquNkjksJG0BTD9ZgnEGBLHWTcQC75/muDGR3wI+5jypW9+xngOkm3y42zYp1:jNpQThBTD7gn0g4Co7+oSmgOk

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

bw82

Decoy

fundamentaliemef.com

gallerybrows.com

leadeligey.com

octoberx2.online

climaxnovels.com

gdsjgf.com

curateherstories.com

blacksailus.com

yjpps.com

gmobilet.com

fcoins.club

foreverlive2027.com

healthyfifties.com

wmarquezy.com

housebulb.com

thebabyfriendly.com

primajayaintiperkasa.com

learnplaychess.com

chrisbubser.digital

xn--avenr-wsa.com

Targets

    • Target

      bc525d61492045490d2881099da3b8c4_JaffaCakes118

    • Size

      981KB

    • MD5

      bc525d61492045490d2881099da3b8c4

    • SHA1

      84f2c141d5edf7e0d7d3ff021272aad17c100705

    • SHA256

      e2f640f8cdc89a54ecd8d1a0c8d4b8a4d1e6560f086fd82d05e0010d95a1d9e9

    • SHA512

      ee7e7bf3422597f784d905e6329e4e8ba0746859d84dcbeeece885283f76c3260c1b687e0f0840d15a96c2c50d1b029931b59491f20c950173e20ac639b65297

    • SSDEEP

      12288:jWMJquNkjksJG0BTD9ZgnEGBLHWTcQC75/muDGR3wI+5jypW9+xngOkm3y42zYp1:jNpQThBTD7gn0g4Co7+oSmgOk

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks