General

  • Target

    88aa97175c6d55223e65e743be166f51_JaffaCakes118

  • Size

    769KB

  • Sample

    241103-aphvzazdkp

  • MD5

    88aa97175c6d55223e65e743be166f51

  • SHA1

    2923d1eacbdec6d2a3e92d096a40f6d59f290c5c

  • SHA256

    e5ffe75fc564d7a8aaabd188868910ddfc90cf64862f1af80a56c306e9b2e762

  • SHA512

    94217458b6fdecc84050e44118012ea0afbff6cb0abbe1efd2202e30e91f990deb04155d4679e32020965b6c41cd62bf6895f4abbaaa93f2333f154ddf460d1d

  • SSDEEP

    12288:OpmCnM2iNeHK7z+enElA8Jw8WBUm6eKJ3aMDD9/NKxR6hN4Yi6nP5sWZC1mwlLL:L4M1bCFhwEN5DNNKj6I+EllL

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uecu

Decoy

ishtarhotel.com

woodstrends.icu

jalenowens.com

manno.expert

ssg1asia.com

telepathylaw.com

quickoprintnv.com

abrosnm3.com

lumberjackcatering.com

beachujamaica.com

thomasjeffersonbyrd.com

starryfinds.com

shelavish2.com

royalglamempirellc.com

deixandomeuemprego.com

alexgoestech.xyz

opticamn.com

fermanchevybrandon.com

milbodegas.info

adunarsrl.com

Targets

    • Target

      88aa97175c6d55223e65e743be166f51_JaffaCakes118

    • Size

      769KB

    • MD5

      88aa97175c6d55223e65e743be166f51

    • SHA1

      2923d1eacbdec6d2a3e92d096a40f6d59f290c5c

    • SHA256

      e5ffe75fc564d7a8aaabd188868910ddfc90cf64862f1af80a56c306e9b2e762

    • SHA512

      94217458b6fdecc84050e44118012ea0afbff6cb0abbe1efd2202e30e91f990deb04155d4679e32020965b6c41cd62bf6895f4abbaaa93f2333f154ddf460d1d

    • SSDEEP

      12288:OpmCnM2iNeHK7z+enElA8Jw8WBUm6eKJ3aMDD9/NKxR6hN4Yi6nP5sWZC1mwlLL:L4M1bCFhwEN5DNNKj6I+EllL

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks