General

  • Target

    c8ca6a9423c0c873479cf9a884725497_JaffaCakes118

  • Size

    863KB

  • Sample

    241205-wf87fsvnex

  • MD5

    c8ca6a9423c0c873479cf9a884725497

  • SHA1

    0860f86752935d3fb49f732a05c5adac7886871a

  • SHA256

    639b60ea1b7a45599670bcc009ca98c0dcd5f231f65706b206456fb33e4217d3

  • SHA512

    aa9a8b33ccb7fedb6225832b9e6fc2530b3a4e531eb437d2b2111395952f1480e69b1924ea1766f444f52704f8b2bffe9c26ee58e7b7a5c837129d6f529185db

  • SSDEEP

    24576:p2KdPp9AR95yvnqPXdxVZ0E8ipPd8caAPVZiyy/:HPpKRyvnqPXz0EfPDVZi

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

p2io

Decoy

essentiallyourscandles.com

cleanxcare.com

bigplatesmallwallet.com

iotcloud.technology

dmgt4m2g8y2uh.net

malcorinmobiliaria.com

thriveglucose.com

fuhaitongxin.com

magetu.info

pyithuhluttaw.net

myfavbutik.com

xzklrhy.com

anewdistraction.com

mercuryaid.net

thesoulrevitalist.com

swayam-moj.com

liminaltechnology.com

lucytime.com

alfenas.info

carmelodesign.com

Targets

    • Target

      c8ca6a9423c0c873479cf9a884725497_JaffaCakes118

    • Size

      863KB

    • MD5

      c8ca6a9423c0c873479cf9a884725497

    • SHA1

      0860f86752935d3fb49f732a05c5adac7886871a

    • SHA256

      639b60ea1b7a45599670bcc009ca98c0dcd5f231f65706b206456fb33e4217d3

    • SHA512

      aa9a8b33ccb7fedb6225832b9e6fc2530b3a4e531eb437d2b2111395952f1480e69b1924ea1766f444f52704f8b2bffe9c26ee58e7b7a5c837129d6f529185db

    • SSDEEP

      24576:p2KdPp9AR95yvnqPXdxVZ0E8ipPd8caAPVZiyy/:HPpKRyvnqPXz0EfPDVZi

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • Xloader family

    • Xloader payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks