General

  • Target

    36797ec026ef56a9ec2be58f804a11af_JaffaCakes118

  • Size

    850KB

  • Sample

    241011-ybbfqsvbpj

  • MD5

    36797ec026ef56a9ec2be58f804a11af

  • SHA1

    a6e03ddc21b97c6ef50ee69ec95b008fbda67e4d

  • SHA256

    ffb4062f3105628be393872c098765b9a7736911cb8fee4ff571b006a891c8a8

  • SHA512

    d4a3aad5560b683fc05b4ec48399bf6412e233bcece7396377f0684b206f5818b918c3fd73bf108371b361d1361882a1a7fdcd40fea0104de06f94c43a1764f4

  • SSDEEP

    24576:iDZPpbcn+nTZkINpPTE0v1HVp6CHJnhM0:4xtcnc9hfv1HGs+0

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

m6b5

Decoy

ixtarbelize.com

pheamal.com

daiyncc.com

staydoubted.com

laagerlitigation.club

sukrantastansakarya.com

esupport.ltd

vetscontracting.net

themuslimlife.coach

salmanairs.com

somatictherapyservices.com

lastminuteminister.com

comunicarbuenosaires.com

kazuya.tech

insightlyservicedev.com

redevelopment38subhashnagar.com

thefutureinvestor.com

simplysu.com

lagu45.com

livingstonpistolpermit.com

Targets

    • Target

      36797ec026ef56a9ec2be58f804a11af_JaffaCakes118

    • Size

      850KB

    • MD5

      36797ec026ef56a9ec2be58f804a11af

    • SHA1

      a6e03ddc21b97c6ef50ee69ec95b008fbda67e4d

    • SHA256

      ffb4062f3105628be393872c098765b9a7736911cb8fee4ff571b006a891c8a8

    • SHA512

      d4a3aad5560b683fc05b4ec48399bf6412e233bcece7396377f0684b206f5818b918c3fd73bf108371b361d1361882a1a7fdcd40fea0104de06f94c43a1764f4

    • SSDEEP

      24576:iDZPpbcn+nTZkINpPTE0v1HVp6CHJnhM0:4xtcnc9hfv1HGs+0

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks