General

  • Target

    1bd2c04eca08ef48cfe2b9860d5d12a7_JaffaCakes118

  • Size

    818KB

  • Sample

    241007-gkh4hatama

  • MD5

    1bd2c04eca08ef48cfe2b9860d5d12a7

  • SHA1

    dffd6174716cce65fb113c228a30adfcebe6f57f

  • SHA256

    cde3eddb48864869869b8a59c81843b8e4fc1243170ff598ec92e28a5d7c8b2e

  • SHA512

    72e78fe2d3b50f1336e0a5e0c03060ff987c6db88e10877fbbf1f9d9bf58e2b9233a904f7f4d56763bf3b0952cf10fbff82620204ae77d645becaa967fd46dc8

  • SSDEEP

    12288:A3JR/HK7zVNr2NSo4X7lJwmcFhKlQbWDUwiFTIqpVFeGOh80kh4ypuL6yqd6ZesL:YqZNKNiXnwz0lQbWDmlVFYhxM

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

p2io

Decoy

essentiallyourscandles.com

cleanxcare.com

bigplatesmallwallet.com

iotcloud.technology

dmgt4m2g8y2uh.net

malcorinmobiliaria.com

thriveglucose.com

fuhaitongxin.com

magetu.info

pyithuhluttaw.net

myfavbutik.com

xzklrhy.com

anewdistraction.com

mercuryaid.net

thesoulrevitalist.com

swayam-moj.com

liminaltechnology.com

lucytime.com

alfenas.info

carmelodesign.com

Targets

    • Target

      1bd2c04eca08ef48cfe2b9860d5d12a7_JaffaCakes118

    • Size

      818KB

    • MD5

      1bd2c04eca08ef48cfe2b9860d5d12a7

    • SHA1

      dffd6174716cce65fb113c228a30adfcebe6f57f

    • SHA256

      cde3eddb48864869869b8a59c81843b8e4fc1243170ff598ec92e28a5d7c8b2e

    • SHA512

      72e78fe2d3b50f1336e0a5e0c03060ff987c6db88e10877fbbf1f9d9bf58e2b9233a904f7f4d56763bf3b0952cf10fbff82620204ae77d645becaa967fd46dc8

    • SSDEEP

      12288:A3JR/HK7zVNr2NSo4X7lJwmcFhKlQbWDUwiFTIqpVFeGOh80kh4ypuL6yqd6ZesL:YqZNKNiXnwz0lQbWDmlVFYhxM

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks