General

  • Target

    26eeb1f0e1206232f233d3710729a98a_JaffaCakes118

  • Size

    1.0MB

  • Sample

    241008-3af22sxdkk

  • MD5

    26eeb1f0e1206232f233d3710729a98a

  • SHA1

    2f49292e05aa8a155372c0856103131285fae88b

  • SHA256

    ecd73f67ea2121ce3aa6ad9e7a63b5360ee5b928c94b69956d8227f54a951349

  • SHA512

    37b10ee98d3a8775c308d61a88b74a5938815c8bcd272713ab9446a99af68d28ab7e5c06adf03e7a5a9edd4e2bebbfb9c3af0ca5e1df51539a33e30ffa4dc77e

  • SSDEEP

    12288:yccaQxt8aq8vbgDPwFVt2NjFjO+ckz9EIFpR6lyLr4ukkknvlP7r9r/+pppppppb:bGb0wFVMNjs9E6QfEvl1+

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

xcw2

Decoy

expdallastx.com

vedanshhomoeopathy.com

ssmt66.com

echomc.xyz

myclarityplanner.com

abrosnm3.com

unitandrea.icu

dftuned.com

sbamilkingmachinery.com

lifesongmidwife.com

crepkonnect.com

reevoy.info

warisanoranglama.com

geotekmapping.com

eert.net

pcmajstor.com

32sj6dxrkx8pfp.xyz

zoomaconsultation.com

vinilikes.com

superbrandsstore.com

Targets

    • Target

      26eeb1f0e1206232f233d3710729a98a_JaffaCakes118

    • Size

      1.0MB

    • MD5

      26eeb1f0e1206232f233d3710729a98a

    • SHA1

      2f49292e05aa8a155372c0856103131285fae88b

    • SHA256

      ecd73f67ea2121ce3aa6ad9e7a63b5360ee5b928c94b69956d8227f54a951349

    • SHA512

      37b10ee98d3a8775c308d61a88b74a5938815c8bcd272713ab9446a99af68d28ab7e5c06adf03e7a5a9edd4e2bebbfb9c3af0ca5e1df51539a33e30ffa4dc77e

    • SSDEEP

      12288:yccaQxt8aq8vbgDPwFVt2NjFjO+ckz9EIFpR6lyLr4ukkknvlP7r9r/+pppppppb:bGb0wFVMNjs9E6QfEvl1+

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks