General

  • Target

    7f420aecf233cd29f38ab8ba4e5527ed_JaffaCakes118

  • Size

    1.4MB

  • Sample

    241030-py62gsvnan

  • MD5

    7f420aecf233cd29f38ab8ba4e5527ed

  • SHA1

    e1e0668e4b0fe9fdd0cb14b4cb67c237979aa13c

  • SHA256

    c35dc511756121de1ea79ead44b8d25157d6356bc5a59c2ff530a60b2c444bec

  • SHA512

    63e97322d82c3d71110ba697a0de4f776a7b967b988ecd4ef0789f44ad23ac85b3c849c9ec0cb140295cfcc9f870a2785addcc150890b1ea297cc9bff8b0868c

  • SSDEEP

    24576:ETcZ8sPcy+5GoPw9AYWespHUKGZT2fXs:kAp9AYWeUURT2/

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

udew

Decoy

danieleawilliams.com

miladjalilian.com

hzmila.com

elecreator.com

instrep.com

4tongzhi.com

sltreeserv.com

expressrev.com

dataresearchcenter.com

filmblingalley.com

3buagency.com

hxjh888.com

gotmetwistedcomb.com

vihco.com

scg.solutions

drcvkm.com

frostresorts.com

gintech.co.uk

luxury-holding.com

roupasdobras.com

Targets

    • Target

      7f420aecf233cd29f38ab8ba4e5527ed_JaffaCakes118

    • Size

      1.4MB

    • MD5

      7f420aecf233cd29f38ab8ba4e5527ed

    • SHA1

      e1e0668e4b0fe9fdd0cb14b4cb67c237979aa13c

    • SHA256

      c35dc511756121de1ea79ead44b8d25157d6356bc5a59c2ff530a60b2c444bec

    • SHA512

      63e97322d82c3d71110ba697a0de4f776a7b967b988ecd4ef0789f44ad23ac85b3c849c9ec0cb140295cfcc9f870a2785addcc150890b1ea297cc9bff8b0868c

    • SSDEEP

      24576:ETcZ8sPcy+5GoPw9AYWespHUKGZT2fXs:kAp9AYWeUURT2/

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks