General

  • Target

    200f1b6cc32e01d765242406ce1cc63a_JaffaCakes118

  • Size

    237KB

  • Sample

    241008-g6tgcswgrc

  • MD5

    200f1b6cc32e01d765242406ce1cc63a

  • SHA1

    1f8e8097b9ef57eb099a0b9dcc68465e4159c8db

  • SHA256

    9aa14501574506627270d8fd1ffba77663640ade1feba0deabbc9ece1f06c0d6

  • SHA512

    7983cfac2deed7954125c3ec5bef920bde1cb1ca95fa2e5b2e284e34848fc4e2fced7e8bef7ee0e276784d396f212bf5e31cde51be6442a7ee55e26be23e9566

  • SSDEEP

    6144:rKoRJD+6EukNMO09vfjTY8+ZpdZQt9FXFZ0KcSTdUwxAEA8:xRRtKNMv9vrcZpXyFXr555AEA8

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

mpus

Decoy

iptcancer.com

jackrabbitpaintllc.com

advancedctech.com

qualitypcth.com

financialfirm.net

tj-troila.asia

torkifood.net

lindsaymanagementgroup.com

ferreiramaquinas.com

handmadebysinead.com

siendotucoach.com

mattinglybrewing.com

bestemployeetests.com

mindenegybenblog.net

longhornbarn.com

jifuopportunity.com

e-studying.com

fuelonwater.com

tokyohotchicken.com

wpactpro.com

Targets

    • Target

      200f1b6cc32e01d765242406ce1cc63a_JaffaCakes118

    • Size

      237KB

    • MD5

      200f1b6cc32e01d765242406ce1cc63a

    • SHA1

      1f8e8097b9ef57eb099a0b9dcc68465e4159c8db

    • SHA256

      9aa14501574506627270d8fd1ffba77663640ade1feba0deabbc9ece1f06c0d6

    • SHA512

      7983cfac2deed7954125c3ec5bef920bde1cb1ca95fa2e5b2e284e34848fc4e2fced7e8bef7ee0e276784d396f212bf5e31cde51be6442a7ee55e26be23e9566

    • SSDEEP

      6144:rKoRJD+6EukNMO09vfjTY8+ZpdZQt9FXFZ0KcSTdUwxAEA8:xRRtKNMv9vrcZpXyFXr555AEA8

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks