General

  • Target

    2c886fae28caeeeb3b0ada64f64abfb9_JaffaCakes118

  • Size

    1018KB

  • Sample

    241009-hbn4tssgrb

  • MD5

    2c886fae28caeeeb3b0ada64f64abfb9

  • SHA1

    5c4225d1d2ef320d6d072e37caeba0ee9adf5e4e

  • SHA256

    383996c33dfd88054e6600a885efa9fe7215f81c35eed57dc09fd9321b1ea634

  • SHA512

    5ee1d72608c4580961f6575921752ee4a61d6da34b3540488456e7d7178b5e78afb87df1505dba2225d042f383697f3456d3893ecae1ecaa8ef9c652036622a7

  • SSDEEP

    12288:PXn+cIgEWHNe5Ac3QghPlwxNUuwAcBXt4gM5/Ll:PXHIgEIclkVwAcBg

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

p2io

Decoy

essentiallyourscandles.com

cleanxcare.com

bigplatesmallwallet.com

iotcloud.technology

dmgt4m2g8y2uh.net

malcorinmobiliaria.com

thriveglucose.com

fuhaitongxin.com

magetu.info

pyithuhluttaw.net

myfavbutik.com

xzklrhy.com

anewdistraction.com

mercuryaid.net

thesoulrevitalist.com

swayam-moj.com

liminaltechnology.com

lucytime.com

alfenas.info

carmelodesign.com

Targets

    • Target

      2c886fae28caeeeb3b0ada64f64abfb9_JaffaCakes118

    • Size

      1018KB

    • MD5

      2c886fae28caeeeb3b0ada64f64abfb9

    • SHA1

      5c4225d1d2ef320d6d072e37caeba0ee9adf5e4e

    • SHA256

      383996c33dfd88054e6600a885efa9fe7215f81c35eed57dc09fd9321b1ea634

    • SHA512

      5ee1d72608c4580961f6575921752ee4a61d6da34b3540488456e7d7178b5e78afb87df1505dba2225d042f383697f3456d3893ecae1ecaa8ef9c652036622a7

    • SSDEEP

      12288:PXn+cIgEWHNe5Ac3QghPlwxNUuwAcBXt4gM5/Ll:PXHIgEIclkVwAcBg

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks