General

  • Target

    277b8bac14e09015d53ad66c97e272a0_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241009-aewn3s1gkl

  • MD5

    277b8bac14e09015d53ad66c97e272a0

  • SHA1

    ef1bd1e7dcd9633244c3e9bcaeef190ff8eab47d

  • SHA256

    45fad79d5665cbad096d1029eb228bdca999352958c393d08e2813787fc2dcb0

  • SHA512

    933f0dbc416e0d409aca40569b8b819690623e342de14aa8a1a51b1714018409bd7a818b334573dc7b1d9a36d4f365264d70bd6ddb16a4692a5c0d145209d708

  • SSDEEP

    12288:SCpc6JmEOMCQryZ/3Mc64rc2JH9EY9n7MKScl8qRi7ggQDmH7PQ6H+Uy1Susr8Mk:LJ0MCiyHfc2bEYt7x83EOMZZS5R0

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

udew

Decoy

danieleawilliams.com

miladjalilian.com

hzmila.com

elecreator.com

instrep.com

4tongzhi.com

sltreeserv.com

expressrev.com

dataresearchcenter.com

filmblingalley.com

3buagency.com

hxjh888.com

gotmetwistedcomb.com

vihco.com

scg.solutions

drcvkm.com

frostresorts.com

gintech.co.uk

luxury-holding.com

roupasdobras.com

Targets

    • Target

      277b8bac14e09015d53ad66c97e272a0_JaffaCakes118

    • Size

      1.3MB

    • MD5

      277b8bac14e09015d53ad66c97e272a0

    • SHA1

      ef1bd1e7dcd9633244c3e9bcaeef190ff8eab47d

    • SHA256

      45fad79d5665cbad096d1029eb228bdca999352958c393d08e2813787fc2dcb0

    • SHA512

      933f0dbc416e0d409aca40569b8b819690623e342de14aa8a1a51b1714018409bd7a818b334573dc7b1d9a36d4f365264d70bd6ddb16a4692a5c0d145209d708

    • SSDEEP

      12288:SCpc6JmEOMCQryZ/3Mc64rc2JH9EY9n7MKScl8qRi7ggQDmH7PQ6H+Uy1Susr8Mk:LJ0MCiyHfc2bEYt7x83EOMZZS5R0

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks