General

  • Target

    079c2e1c486dbdfd4259afc0d51f432b_JaffaCakes118

  • Size

    539KB

  • Sample

    241001-1zzvcasfrr

  • MD5

    079c2e1c486dbdfd4259afc0d51f432b

  • SHA1

    68cd10e08cb8fbc9fcc45ef4a23e2c2eec100e0f

  • SHA256

    46fa7e230e5d8398c15c24dd78906dcf50da9bb1d2cfd8682ad7f2f80819a3a8

  • SHA512

    21cdfc0a63ac031bc30ba212c3a9eab42057a0332a67431ca589b8176fc73432ba423da3c0b43575f1c322b58669531e1db9f866e52e266678c532c26fe4bb8e

  • SSDEEP

    12288:yglm7yzAmZFj81+hra7UjPHEJG3S12U6LWOZgZ4/NcvJ:Blaejccra7sOd12UsWoNoJ

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ef6c

Decoy

gicaredocs.com

govusergroup.com

conversationspit.com

brondairy.com

rjtherealest.com

xn--9m1bq8wgkag3rjvb.com

mylori.net

softandcute.store

ahljsm.com

shacksolid.com

weekendmusecollection.com

gaminghallarna.net

pgonline111.online

44mpt.xyz

ambrandt.com

eddytattoo.com

blendeqes.com

upinmyfeels.com

lacucinadesign.com

docomoau.xyz

Targets

    • Target

      079c2e1c486dbdfd4259afc0d51f432b_JaffaCakes118

    • Size

      539KB

    • MD5

      079c2e1c486dbdfd4259afc0d51f432b

    • SHA1

      68cd10e08cb8fbc9fcc45ef4a23e2c2eec100e0f

    • SHA256

      46fa7e230e5d8398c15c24dd78906dcf50da9bb1d2cfd8682ad7f2f80819a3a8

    • SHA512

      21cdfc0a63ac031bc30ba212c3a9eab42057a0332a67431ca589b8176fc73432ba423da3c0b43575f1c322b58669531e1db9f866e52e266678c532c26fe4bb8e

    • SSDEEP

      12288:yglm7yzAmZFj81+hra7UjPHEJG3S12U6LWOZgZ4/NcvJ:Blaejccra7sOd12UsWoNoJ

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks