General

  • Target

    52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118

  • Size

    844KB

  • Sample

    241017-vj4wgayfqn

  • MD5

    52bf72d40f8ecc722a7d8d6ae83ad2d9

  • SHA1

    cb2013d03a2bf04448b20a5a4aec0a8f979c8d9b

  • SHA256

    d2e29e115cef90f4158d21938c7458762bb01be720156a2f7c8bb8d021704fef

  • SHA512

    b35ff42e9fb56cedd485a0d307a59b4b4568ef9b04f8f4346fe8100becd9604d0e3ea1bb2764f017ef88834d24649ecb93afc8fd653469887f0731c2b0998474

  • SSDEEP

    12288:x1kMHia17eHK7zvdqcFhPfmUxYXNUuki1qcbJdwd2/a:qcTdqMVfd2XNZLbJWES

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uqf5

Decoy

suiddock.com

sweetgyalshop.com

puterigarden.com

orangestoreusa.com

prostirkarpat.com

ajierfoods.com

mindlablearning.com

factiive.net

beautifulbrokenhearts.com

direcionalreservapraca.com

tvhoki.com

themoderncoachinstitute.com

classactionwalgreens.com

haloog.com

sachinkaushik.com

daleearnhardtjrchevyvip.com

disconight.net

ocyslibes.icu

encounterfy.com

infamoudpapertrail.com

Targets

    • Target

      52bf72d40f8ecc722a7d8d6ae83ad2d9_JaffaCakes118

    • Size

      844KB

    • MD5

      52bf72d40f8ecc722a7d8d6ae83ad2d9

    • SHA1

      cb2013d03a2bf04448b20a5a4aec0a8f979c8d9b

    • SHA256

      d2e29e115cef90f4158d21938c7458762bb01be720156a2f7c8bb8d021704fef

    • SHA512

      b35ff42e9fb56cedd485a0d307a59b4b4568ef9b04f8f4346fe8100becd9604d0e3ea1bb2764f017ef88834d24649ecb93afc8fd653469887f0731c2b0998474

    • SSDEEP

      12288:x1kMHia17eHK7zvdqcFhPfmUxYXNUuki1qcbJdwd2/a:qcTdqMVfd2XNZLbJWES

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks