General

  • Target

    42d14493d70781dbb667f48ed49b3883_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241014-snmrmsvgkq

  • MD5

    42d14493d70781dbb667f48ed49b3883

  • SHA1

    2a636e319dc2c246b45cacff8391d7fcf071281f

  • SHA256

    013ae675443decd1083ec918ee62b59dfc8b3e17e41f96f4be21c3260a2f372b

  • SHA512

    1bf6eba2199570437e877f7f8708434d1b7aec9300d1e24105e5af8f4a9b3faf079931a72fd20bbead7706bf7cdf65464d5db87b61fe561724f42a07044e64f8

  • SSDEEP

    24576:swVbBEwUQK6Q+phT6OUK7vtZmih+MZZS5R0:BbBEp9+qOYM3B

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

p2io

Decoy

essentiallyourscandles.com

cleanxcare.com

bigplatesmallwallet.com

iotcloud.technology

dmgt4m2g8y2uh.net

malcorinmobiliaria.com

thriveglucose.com

fuhaitongxin.com

magetu.info

pyithuhluttaw.net

myfavbutik.com

xzklrhy.com

anewdistraction.com

mercuryaid.net

thesoulrevitalist.com

swayam-moj.com

liminaltechnology.com

lucytime.com

alfenas.info

carmelodesign.com

Targets

    • Target

      42d14493d70781dbb667f48ed49b3883_JaffaCakes118

    • Size

      1.5MB

    • MD5

      42d14493d70781dbb667f48ed49b3883

    • SHA1

      2a636e319dc2c246b45cacff8391d7fcf071281f

    • SHA256

      013ae675443decd1083ec918ee62b59dfc8b3e17e41f96f4be21c3260a2f372b

    • SHA512

      1bf6eba2199570437e877f7f8708434d1b7aec9300d1e24105e5af8f4a9b3faf079931a72fd20bbead7706bf7cdf65464d5db87b61fe561724f42a07044e64f8

    • SSDEEP

      24576:swVbBEwUQK6Q+phT6OUK7vtZmih+MZZS5R0:BbBEp9+qOYM3B

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks