General

  • Target

    638b6ebd151367c3edb3c71446f69dd7_JaffaCakes118

  • Size

    832KB

  • Sample

    241020-wer7jstcml

  • MD5

    638b6ebd151367c3edb3c71446f69dd7

  • SHA1

    940e938809b6cef36948df102cb4304969c2f58a

  • SHA256

    fd151f1c914b41e565c1dfeae2cab5c77fdcc885b83c46e30b9fe3eefc68efd3

  • SHA512

    8b5ad4d87c24bde0685e6f458597a3bbf3df1892c6de08e22c66cc7f84ff650ab2e7917cc172f3fa85917578a28749b7c2ad844e80b2452ee35c0d13d242b6f9

  • SSDEEP

    12288:G49Q4FR9/HK7zPxQ9l2hZQ9ixuWFECiUnQ5np6m2s94pcwwsqO9gAAu8WP3YxAEq:9JFuNG2hHuwkUQ2m2s9qNqOfgW/

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

gno4

Decoy

callsecuritymusic.com

quikngo.com

gardenofbabyclothes.com

bailbondinculvercity.com

nqyaurlz.icu

sultanulhind.com

toddy-bodies.com

kom-hunter.com

theradibio.com

pageonefourplay.info

wildlifetools.com

nobleegoist.com

girlsjerkoff.com

theenlows.com

jyqcxl.com

southernbluebee.com

betfootballthaigold.com

remaxaffinityplus.net

teamlunsford.com

howtoberealonline.com

Targets

    • Target

      638b6ebd151367c3edb3c71446f69dd7_JaffaCakes118

    • Size

      832KB

    • MD5

      638b6ebd151367c3edb3c71446f69dd7

    • SHA1

      940e938809b6cef36948df102cb4304969c2f58a

    • SHA256

      fd151f1c914b41e565c1dfeae2cab5c77fdcc885b83c46e30b9fe3eefc68efd3

    • SHA512

      8b5ad4d87c24bde0685e6f458597a3bbf3df1892c6de08e22c66cc7f84ff650ab2e7917cc172f3fa85917578a28749b7c2ad844e80b2452ee35c0d13d242b6f9

    • SSDEEP

      12288:G49Q4FR9/HK7zPxQ9l2hZQ9ixuWFECiUnQ5np6m2s94pcwwsqO9gAAu8WP3YxAEq:9JFuNG2hHuwkUQ2m2s9qNqOfgW/

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks